• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    A prototype of quantum von Neumann architecture

    2022-10-22 08:14:48DongShengWang
    Communications in Theoretical Physics 2022年9期

    Dong-Sheng Wang

    CAS Key Laboratory of Theoretical Physics,Institute of Theoretical Physics,Chinese Academy of Sciences,Beijing 100190,China

    Abstract A modern computer system,based on the von Neumann architecture,is a complicated system with several interactive modular parts.It requires a thorough understanding of the physics of information storage,processing,protection,readout,etc.Quantum computing,as the most generic usage of quantum information,follows a hybrid architecture so far,namely,quantum algorithms are stored and controlled classically,and mainly the executions of them are quantum,leading to the so-called quantum processing units.Such a quantum–classical hybrid is constrained by its classical ingredients,and cannot reveal the computational power of a fully quantum computer system as conceived from the beginning of the field.Recently,the nature of quantum information has been further recognized,such as the no-programming and no-control theorems,and the unifying understandings of quantum algorithms and computing models.As a result,in this work,we propose a model of a universal quantum computer system,the quantum version of the von Neumann architecture.It uses ebits (i.e.Bell states) as elements of the quantum memory unit,and qubits as elements of the quantum control unit and processing unit.As a digital quantum system,its global configurations can be viewed as tensor-network states.Its universality is proved by the capability to execute quantum algorithms based on a program composition scheme via a universal quantum gate teleportation.It is also protected by the uncertainty principle,the fundamental law of quantum information,making it quantum-secure and distinct from the classical case.In particular,we introduce a few variants of quantum circuits,including the tailed,nested,and topological ones,to characterize the roles of quantum memory and control,which could also be of independent interest in other contexts.In all,our primary study demonstrates the manifold power of quantum information and paves the way for the creation of quantum computer systems in the near future.

    Keywords: quantum computation,quantum channel,von Neumann architecture

    1.Introduction

    In quantum computing,we often apply sequences of unitary operations on multi-qubit states,followed by measurements.This is described in the quantum circuit model,the most popular model for universal quantum computing[1].Being universal is not only vital to prove its own consistency [2–4],but also to demonstrate its power relative to conventional computing.However,the quantum circuit model is not complete so far in the sense that it does not provide a quantum computer system,the quantum version of the von Neumann architecture of modern computers [5].A modern computer system contains at least five modular components: the input,output,memory unit,control unit,and computing unit (also known as a central processing unit).In particular,the memory contains stored programs,which enables the power of modern classical computers to automate the execution of algorithms.The current paradigm for quantum computing is a quantum–classical hybrid: the quantum circuit model mainly serves as a quantum central processing unit,which is usually classically controlled with quantum algorithms stored as classical programs.There are excessive amounts of classical ingredients which appear inevitable.

    There have been persistent efforts to go beyond the scope of the circuit model,even starting from the beginning of quantum information.In the setting of a quantum Turing machine,it was pursued if quantum computing can be fully quantum[6–8],i.e.with all components including the read-write head,the address of qubits,programs,control,halt signal,etc being quantum.It was then discovered that programs cannot be made quantum in the sense that once a program is stored as a quantum state,it cannot be read out deterministically[9].An obstruction for the quantum control over arbitrary quantum operations is also revealed lately [10–13].These studies together with other no-go theorems,e.g.[14–23],illustrate the sharp distinction between quantum information and classical ones.

    The difficulty to formalize a universal quantum computer system is linked to a vital issue of quantum physics.It concerns if there is a so-called quantum–classical boundary,and how or where to draw such a boundary[24].From the modern theory of quantum decoherence [25],classicality arises if the coherence of a quantum system is lost or delocalized into another system.As the elements of quantum information,qubits are considered to be the extensions of bits and probabilistic bits (or pbits),in the sense that a qubit is a superposition of bit values,and it leads to pbits if it is measured.This heuristic indicates that,instead of being puzzled by the nature of quantumness,the central issue for a proper model of a quantum computer system is to unfold the quantum advantages for various information processing tasks.

    In this work,we propose a prototypical model of a universal quantum computer system.The central ingredient is a stored-program scheme based on the quantum channel-state duality [26,27].The stored quantum programs can be composed together,processed into other ones,and executed to realize quantum algorithms.Our model is not only universal and modular but also quantum-secure,in the sense that it is protected by the uncertainty principle,which has played vital roles in quantum communication and cryptography [28].

    Our work is made possible based on a few recent progressions.First,the essence of some no-go theorems becomes clearer,including the no-programming [29–31],no-control[12],and the incompatibility between transversality and universality of logical gates [32–39].The linearity of quantum operations and fundamental constraints by the uncertainty principle are revealed.Meanwhile,a scheme using Choi states as stored quantum programs is proposed[40],which turns out to be the proper way to bypass the accuracy constraint by the uncertainty principle.Also,we recently presented a physical understanding of various universal computing models[41].In particular,we pointed out the relation between the uncertainty principle and logical gates,and the relation between quantum algorithms and quantum combs [42–46].These progresses,but not limited to,enable the formation of a universal quantum computer system with less classical ingredients.

    1.1.Overview of our model

    Here we provide an overview of the model of a quantum computer system (QCS),which shares similarities with the classical case but also shows key distinctions.As for the classical case,there are five modular components: the input,output,memory unit,control unit (CU),and central processing unit (CPU).See figure 1.We treat the CU as a separate part from the CPU.We only focus on the functionality of these components,e.g.how they work and relate with each other.We do not study devices or hardware in this paper which should be specified for a practical QCS.This will be further discussed in section 7.

    Figure 1.The five primary components of a computer system: the input,output,memory unit,control unit,and central processing unit.Their relations in terms of control and information flows are not shown explicitly here.More details can be found in computerscience textbooks,e.g.[47].

    A modern CPU has a few components such as its own memory and control,but here we treat it as an arithmetic unit and study the quantum version,the quantum processing unit(QPU).A QPU contains at least two parts:the qubits required to perform quantum circuits,and the devices that are needed to realize quantum gates on the qubits and qubits from the memory.The quantum memory stores data and programs,both are in terms of Choi states [26,27].Quantum programs are stored as many copies of Choi states of quantum operations.Quantum data are stored as many copies of Choi states of preparation circuits for states.In our model,a computation is carried out on a part of memory under the control of a quantum control unit (QCU),which contains a collection of qubits.A large program is formed by the composition of small programs from the memory.The initial input state is‘injected’into the program by measurements.The solution to a given problem is obtained by measurements of observable on the final state.

    Compared with classical cases,there are two major differences.First,due to the uncertainty principle,quantum data can be made secure,termed as‘quantum-secure’in this work,hence cannot be cloned or estimated efficiently.Second,quantum measurements are interactive with random outcomes.After a computation,the stored programs are consumed but can be restored.A quantum eavesdropper(Eve)or virus can destroy the programs by local measurements without knowing the programs,or,if powerful,can do joint measurements on a few copies to estimate a program state,for which the accuracy is limited by the uncertainty principle.On the contrary,classical data can be cloned if not encrypted,and classical measurements (e.g.read-write operations) are usually deterministic.This not only harvests quantum evolution as a computational resource but also harvests quantum memory and quantum measurements as resources.

    Using stored quantum programs provides advantages especially when this cannot be efficiently done classically,but also leads to a few challenges.First,in order to execute a stored program or algorithm exactly and deterministically,the input to the algorithm is prepared in a heralded way.The output of an algorithm is required to be expectation values of observables,instead of being the final state itself.It appears that quantum computing occurs in Hilbert spaces,but eventually,the information carried by quantum states has to be read out by measurements,i.e.we have to convert qubits into bits to obtain the solution to a given problem.This leads to our refinement of universality to be algorithmic (see section 3).Also due to the requirement of fault-tolerance,there will be the potential overhead of quantum error correction on the quantum memory (see section 5).This also makes a quest for the finding of fully or partially self-correcting qubits [48].Our study proves that a QCS,as the analog of the classical ones,can be established in principle.

    This work contains the following parts.In section 2 we survey the primary tools including quantum channels,quantum combs,quantum error correction,the quantum circuit model and quantum algorithms,and a few no-go theorems and their relations with the uncertainty principle.In section 3 we explain the main ingredients for our model of QCS,including the stored quantum programs and data,an extension of quantum circuits by stored programs,which are defined as tailed quantum circuits,a definition of algorithmic universality to describe the execution of quantum algorithms,and a description of the quantum control unit.We further discuss the features and requirements of the model in section 4,and its relation with some other models.In section 5 we show that QCS can be made fault-tolerant,hence completing the formalization of universal QCS.Finally,in section 6 we briefly discuss a few extensions of our study and conclude with more problems relating to QCS in section 7.

    2.Preliminary

    In this section,we review the primary background to make our presentation self-consistent.Along the way,we clarify facts and draw connections that are relevant to our study of QCS.

    2.1.Quantum operations

    We consider finite-dimensional Hilbert spaces.A pure state|ψ〉is an element of a Hilbert spaceH with the normalization〈ψ|ψ〉=1 and any global phase is unphysical.A mixed state or density operatorρ∈D (H) is a nonnegative semidefinite operator acting onH withtrρ=1,forD (H) ?B (H) as the convex set of all mixed states,B (H)as the space of bounded linear operators acting onH.A simple way to distinguish mixed states from pure states is by the purity

    which only equals to 1 for pure states.The purity is preserved under unitary evolution,which is described by unitary operatorsU∈U (H) in the unitary group U (H) acting onH.More general evolution is described as completely positive,trace-preserving (CPTP) maps [49]of the form

    Figure 2.Quantum circuit diagrams (from top to bottom,left to right) for a quantum channel,Choi state,composition of two Choi states,unitary dilation of a channel,initial-state injection scheme on a Choi state,and superchannel acting on a Choi state.The curved wires are ebits,boxes are quantum operations,their meanings shall be clear from the main text.

    for ?ρ∈D (H),also known as quantum channels,and Kiknown as Kraus operators.This is also called a Kraus operator-sum representation,which is not unique due to an isometric degree of freedom.The minimal number of Kraus operators is the rank of the channel.A positive operatorvalued measure(POVM)is a set{Fi}with Fi≥0,∑iFi=1.It can be constructed from Kraus operators withFi=Ki?Ki.A quantum instrument {Φi} is a set of CP maps Φiso that the sum of them Φ=∑iΦiis TP,and the set of indices[i]is fixed.A quantum channel E : D (H1)→D (H2) does not need to preserve the dimensions of Hilbert spaces,but for simplicity,our presentation is made for the dimension-preserving case without loss of generality.We use E: D (H) to represent a channelE that acts onD (H).

    Any quantum channel E: D (H) can be represented as its dual state

    usually known as a Choi state [26,27],for ω:=|ω〉〈ω|,andd=dim(H).The state |ω〉 is a Bell state,also known as an ebit.Kraus operators can be found from the eigenvalue decomposition ofωE.Choi states are bipartite and for clarity,we label them as site A and site B in order.The partial trace of a Choi state is constrained as trAωE=and trBωE=GivenωE,the action of the channel can be obtained as

    for ρtas the transpose of a stateρ∈D (H).

    We see that ω is the dual state of1.There is a concise graphical way to illustrate this map,see figure 2.For an operatorA∈B (H),define its vectorization as

    which has the property|ωA〉=1 ?At|ω〉.The vectorization or duality is just to bend over the input towards the bottom of the output wire.This can be generalized if the given system is multi-partite.For n-partite operators,|ω〉?nis needed and it holds

    for=RAt R,R is the unitary operation that reverses the order of the subsystems.For the bipartite case,R is the swap operation.The relation above can be seen as to shuffle the operator A along the wires from the top to the bottom.Alternatively,an n-partite operatorA∈B (H) can be just treated as a single partite,and we can use a high-dimensional Bell state ∣ω〉 ∈H ?H to define the vectorization.In this case,=At.Despite the two choices,we still view the Choi state of an operator as a unique definition.

    The general actions on Choi statesωE∈ C (H ? H)?D (H ?H) are found to be superchannels [42–44],which again can be represented by their dual states.To describe them,we use the unitary dilation representation of them which is more appropriate for the quantum circuit model.For a channel E: D (H),from dilation,it can be realized by a unitary U with

    for U as the superoperator form of a unitary U,the trace over an ancilla at an initial state|0〉,which realizes Kraus operators as Ki=〈i|U|0〉,with {|i〉} as states of the ancilla.In order to tell channels from superchannels,we use a hat on the symbols for superchannels.A superchannel: C (H ?H) can be realized as

    forρ∈D (H),E: D (H),U andV are unitary,and a is an ancilla.Note that the dimension of V can be larger than U,while here we find no need to provide the details of the ancilla.The Choi stateωEcan be made explicit by bending over the input wires,see figure 2,with

    where the support of each operator shall be easy to see hence omitted for simplicity.The trace is over the subsystems except for the top one,A.The unitaryis the transpose of U conjugated by a swap.This formalism for superchannels includes channels as a special case with no channelE as input and no.We see that in order to change a channel to another one,we have to use both a pre-and post-unitary operations,with a memory wire connecting them.More generally,quantum n-combs are defined when (n-1) channels are taken as input sandwiched between unitary operations[42–46].As such,states,channels,and superchannels are also called 0-combs,1-combs,and 2-combs,respectively.

    In quantum computing,an important type of quantum operation is quantum error correction (QEC),which corrects errors that occur on quantum error-correction codes (QECC).A quantum code is often defined by an encoding isometryV: HL→HP,with V?V=1,or by the projector P=VV?on the code space,C ?HP.A set of error operators {Ei} acting on a code P is correctable when

    and [cij]:=ρPcan be viewed as a state.The correction or recovery scheme,R,is defined as a set {Rk} withRk=PFk?for dkas eigenvalues of ρP,and FksatisfiesPFk?F?P=dkδk?P.When the error operators form a channel,N,the logical information is perfectly recovered RN(∣ψ〉)=∣ψ〉, ?∣ψ〉 ∈C.In addition,the condition for error-detection by P is PEiP=eiP,weaker than the QEC condition.

    We see that QEC is to find the inverse of a map N,which does not exist in general but is possible when its action on a subspaceC is concerned.The QEC condition(10) is actually more powerful:any set of operators{Ai}with each Aias a linear combination from{Ei}can also be corrected byR.This is often known as the linear Kraus-span property as the error operators are considered as Kraus operators for channels.For codes with tensor-product form HP=?nHn,we only need to consider a spanning set of errors for each subsystem n,as others are linear combinations of them.For multi-qubit codes,we often consider Pauli bit-flip error X and phase-flip error Z for each qubit,with Y as a product of them,and that is sufficient to characterize the primary error-correction features of a code,such as code distance and threshold.A QECC is usually denoted as C=[[n,k,d]],which uses n physical qubits to encode k logical qubits,and has a distance d=2t+1,namely,can correct errors that act on up to t physical qubits at unknown sites.There are also approximate QECC which we do not focus on in this paper.

    2.2.Quantum circuit model

    There are a few universal quantum computing models [41]and here we employ the quantum circuit model(QCM)in our study.In the setting of QCM,universality means that any unitary operator U ∈SU(2n) can be efficiently approximated byto an arbitrary accuracy ∈.The circuit size ofshall be polynomial of log

    In QCM,a unitary U is realized as a sequence of gates that are available,and an algorithm is realized by acting U on an input state,followed by a measurement process for readout.A gate is a unitary operation that can be turned on and off by external control.A set of gates is called a universal gate set if the product of gates from it can approximate any unitary efficiently.The two well-known examples are the set {H,T,CX} and the set {H,CCX} for

    and CCX as the Toffoli gate CCX=P0?1+P1?CX,CX usually denoted as CNOT,and X,Z as Pauli matrices,P0,1=The Toffoli gate is known to be universal for classical computation.We do not need to consider nonunitary gates since,due to the dilation theorem,any nonunitary quantum channel can be realized by a unitary operator,together with final measurements on ancilla.When QEC rounds are required,they can also be realized by unitary operations followed by measurements.

    In quantum circuits,quantum gates are causally ordered in the sense that the space and time location of a gate is classical and controlled by a classical computer or system.Also the direction of time,namely,the information flow,of a circuit is fixed,which is from the given input to the desired output.This agrees with the intuition from classical algorithms,which can be generalized for the quantum case (see section 3).

    Figure 3.Quantum algorithm and special cases (from left to right,top to bottom):classical one by permutation Π from bits to bits(e.g.a bit-string i to j),quantum one by unitary U from bits|i〉to bits|j〉or a nontrivial entangled state|ψ〉,and with the final bit values read out by measurement.This also applies to quantum meta-algorithms,i.e.combs.The classical circuit-design algorithm is not shown here,see figure 4.

    Quantum algorithms can be described relative to a universal computing model,such as adiabatic algorithms and quantum walks,but they can be translated into the circuit model.A quantum algorithm,Q,is usually described by a quantum circuit,together with a proper initial state and readout scheme.The readout contains the solution S to a given problem,P,which is the input of a classical circuitdesign algorithm,A.Namely,A:P ?[Q]for[Q]as a classical description of the quantum algorithm Q:|0〉?S,with S as measurement outcome and |0〉 as an initial state required by Q.See figures 3 and 4.This framework applies to many quantum algorithms,including quantum phase estimation,quantum simulation,etc [1].The classical algorithm A is an essential part and often difficult to find,and it could be limited if [Q]cannot be efficiently described.

    The solution to a problem is encoded in the expectation value

    of observableO on the final state ρf.The measurement scheme ofO is required to be efficient.This usually requires running many rounds of the circuit to estimate the observable.Sometimes the output is just the final state ρfwithout a measurement,which can be subsequently given into another quantum algorithm,yet eventually,measurement is required to convert quantum states into classical values.Quantum algorithms are generically probabilistic,namely,within a given accuracy ∈,the approximate solution ofis obtained with a high probability p that can be efficiently boosted towards 1.We emphasize here that a quantum algorithm is a generalization of a probabilistic algorithm,or in other words,it unifies classical and probabilistic ones.The output of the quantum algorithm is of the formtr(Oρf),which needs both quantum state generation and quantum measurement.

    Figure 4.Structures of quantum algorithms.The basic structure(topleft) has a classical algorithm A that designs the quantum algorithm Q,or labelled by the unitary circuit U.It extends to the iterative classical-quantum algorithms (top-right),which can be ‘stretched’into a linear flow (bottom),and the most general forms in terms of quantum combs,see figure 8.

    2.3.Quantum no-go theorems

    Although quantum information is an extension of the classical case,there are significant differences that are apparently revealed by various so-called no-go theorems.The goal of this section is to show that a few fundamental no-go theorems are equivalent,and the underlying physics is the uncertainty principle.

    The no-cloning theorem [14,15]is well known and it states that an unknown quantum state cannot be cloned by any quantum operations,e.g.from|ψ〉to|ψ〉|ψ〉.In general,it applies to n→m cloning process

    for m >n,U and |χ〉 are independent from the input |ψ〉.It would violate the linearity of quantum operations.It was shown to be equivalent to a quantum estimation problem[19],namely,a perfect quantum cloning machine will estimate an unknown state perfectly,and a perfect quantum estimation machine will also yield many copies of an unknown state.The quantum estimation task can be realized by a unitary operation with

    for |[ψ]〉 as a bit-string encoding of |ψ〉 or the estimated parameters in it.The states|[ψ]〉are orthogonal for any pair of input states.For pure states,the set of states that can be perfectly cloned or estimated are orthogonal with each other.

    The no-programming theorem [9]is also due to orthogonality.If there is a quantum operation U that realizes

    for any data state|d〉and any program state|PG〉that encodes the unitary operator G serving as a program,then the set of programmable states {|PG〉} have to be orthogonal.Orthogonality implies classicality since an orthogonal set of states can be viewed as a basis of a Hilbert space.Any superposition of basis states is not programmable.Note that the output is product states.The no-programming has also been extended to POVM [20]and the physics is similar.

    It is easy to see its relation with the cloning and estimation task.If |PG〉 can be cloned or estimated perfectly,it would lead to a perfect universal programming machine.On the contrary,the state ∣PG′〉is independent of |d〉 so it can be recycled [31]to recover |PG〉,which would lead to the execution of G an arbitrary number of times,which is a cloning of G or state G|d〉.

    Furthermore,it is well understood that quantum estimation can be done probabilistically or approximately,and a probabilistic scheme can also be treated as an approximate scheme if the outcomes are mixed together.In quantum metrology,it has been established that an arbitrary parameter held by a quantum state or evolution can only be estimated approximately,and the error is lowered bounded due to the uncertainty principle and also the extension of it via quantum Fisher information [50].Although there are many variants of the uncertainty principle based on different operations,the essential fact it established from the Cauchy—Schwarz inequality

    for|x,y〉from an inner-product space is that the uncertainty of two non-commuting operators on a quantum system is lower bounded by the degree of their non-commutativeness.Optimal schemes for universal quantum cloning,estimation,and programming are known [29,31,51,52],and the common fact is that,given n copies of the unknown parameter,state,or gate,the accuracy is no better than the scaling 1/n2,which is achievable using multipartite entangled states.Without entanglement,the accuracy bound reduces to the so-called short-noise limit 1/n.The accuracy cannot be exponential(e.g.2-n) as that would converge to the perfect case,hence violating the no-go theorems.

    There is also a no-go theorem in the setting of QECC[23],which states that the transversal logical gates on a finitedimensional quantum error-detection code form a finite group.We can see the connection with the above no-go theorems from the error-detection condition and output state form.An encoding operation can be defined by a unitary operator U:|?〉→|ψ?〉that maps logical states ∣?〉 ∈HLto the encoded states∣ψ?〉 ∈HP.For a transversal partition HP=?nHn,any transversal unitary operator takes the form

    Now suppose the states|ψ?〉are product states ?n|ψn〉instead of being entangled.If the error-detection condition is required,then all 1-local states are fixed,which is then impossible to encode logical states |?〉.If the states |ψ?〉 are product states,while the error-detection is only for classical errors,e.g.for bit-flip errors on any site but not for phase-flip errors,then we find orthogonal logical states are mapped to orthogonal 1-local states for all sites.Here we notice the orthogonality and this actually leads to classical error-detection codes.Now if we allow entangled states |ψ?〉,the errordetection will require the set of transversal logical gates to be a finite group.This is a feature that is not present in other nogo theorems we mentioned above.If the error-detection condition is dropped,then SU(2n)-covariant codes exist[32–39]which apparently allow any transversal logical gates.However,the accuracy of such codes is limited by the uncertainty principle,and for n transversal parts,the accuracy is upper bounded by 1/n2[36,37].Indeed,the encoding operation can be viewed as an estimation scheme of |?〉,and the transversal operations are the parallel black-box calls.The optimal entangled resource states for estimation are also found to be optimal for SU(2n)-covariant codes [38].

    Another notable no-go theorem is the no-control over unknown quantum operations [10,11],which forbids the process

    for fixed unitary U1,2,3acting on the tri-partite system,and any unknown U acting on the third subsystem,and CU as the controlled-U on the second and third subsystems,up to an arbitrary global phase on U.It turns out it is of a different category from the three no-go theorems above.It not only violates the linearity of quantum operations,but also the meaningless of global phases of quantum states or operations.The above process would lead to the perfect distinction between a gate U and-U,which is impossible in quantum theory.This has been shown as a topological obstruction from the Borsuk–Ulam theorem [12],and there is no approximate version of the no-control theorem.It also forbids the process|ψ1〉|ψ2〉?|ψ1〉⊕|ψ2〉 since it maps global phases of one state to relative phases between the two states.In general,this is a ‘no-packing’ of unknown quantum operators,and such packings are not valid operations on Hilbert spaces.

    It turns out there is an easy scheme to overcome the nocontrol theorem [10–13],which is to know at least one eigenstate of the gate U.Given the black-box access of U,the CU can be realized as

    for a as an ancilla and 1aas the completely-mixed state of it,CSWAP as the controlled-SWAP gate,and the input state for the target of CU is the known eigenstate of U.In addition,another case is when the gate CU itself is given with U unknown,which applies to situations that U has trivial action on a few levels or modes that belongs to the whole Hilbert space[13].These levels or modes are eigenstates of CU with eigenvalues 1.

    3.Ingredients

    3.1.Stored quantum programs and data

    Stored programs and data are important components of the von Neumann architecture of computers.Despite the noprogramming theorem,here we present an efficient scheme of stored quantum programs and data,based on the recent study[40],and this is the starting point for our model of QCS.The quantum memory unit in QCS contains many programs and data,each of which are prepared with many copies made and stored with definite addresses in the memory unit.The query of quantum memory and computation with them is efficiently controlled by the quantum control unit.For simplicity,we focus on the unitary evolution of pure states,which can be quite straightforwardly extended to the non-unitary evolution of mixed states.

    For a pure state ∣ψ〉 ∈H,a simple scheme is just to prepare |ψ〉 and store it as quantum data.While here we introduce a different scheme that will be employed in our model.We define its computational preparation circuit as U with |ψ〉=U|0〉,for |0〉 as a computational basis state ofH.The U is not unique but can always be chosen properly.We define quantum data of |ψ〉 as the Choi state |ωU〉 of its preparation circuit U.For an n-qubit state,it needs 2n qubits to store it as quantum data.In general,this storage can be made arbitrarily accurate if the accuracy of |ω〉 and U can be guaranteed.On the contrary,we can store a state |ψ〉 directly as classical data,denoted as [ψ].For generic n-qubit states,this is to convert all the amplitudes ψi=〈i|ψ〉into bits,which cannot be efficient with respect to n.Only special types of states such as stabilizer states[53]can be described efficiently using bit strings on classical computers.

    A quantum program or algorithm is defined by a unitary operator,while often also requiring special initial states as input and special measurements as a readout scheme.For simplicity,we treat the input as a part of data,and readout as a separate stage.Namely,a quantum program merely refers to a unitary operator U.Similar to quantum data,a stored quantum program |ωU〉 is the Choi state of U.

    From the relation (4),the action U|ψ〉can be realized by the measurement of|ψ〉on site B of|ωU〉[40].Define a binary projective measurement {P0,P1} with

    for P0tas the transpose of P0,and the measurement outcomes 0 and 1 are recorded.When the outcome is 0,the state on site A is U|ψ〉.When the outcome is 1,the state on site A is1-U|ψ〉〈ψ|U?.This is enough for the readout of the computational resulttr(Oρf),which is encoded as an observableO on site A,for ρf=U|ψ〉〈ψ|U?and the valuetr (O) is efficiently computable as required by the readout scheme (see section 3.3 for more discussions).

    When the input |ψ〉 is stored as the quantum data of its preparation circuit,we need the composition of Choi states.Given two Choi states∣ωU1〉and∣ωU2〉,the symmetry-based quantum gate teleportation [40]leads to the state∣ωU2U1〉orin a heralded way.Namely,a qubit ancilla is used to encode the outcomes of Bell measurement being trivial (with no byproduct) and non-trivial (with Pauli byproducts),recorded by 0 and 1.The case of being 0 requires no further action but only teleports U2t,while the case of being 1 can teleport U2but need a correction rotation U2;adjas the adjoint representation of U2.As a unitary matrix can be decomposed as a product of two symmetric unitary matrices,a program can be stored by two Choi states and the composition

    will avoid the transpose (of U2) and becomes deterministic.In this work,we name the symmetry-based quantum gate teleportation as an SU(d)-covariant or universal quantum teleportation (UQT) since it can teleport any unitary gate,which eventually guarantees the universality of our storedprogram scheme.The UQT serves as the composition operations and is denoted by a rounded box in the circuit,see figure 2 (or by distinguished wires in figure 7 or circles in figure 10).

    We see that after the execution,the quantum program is destroyed,i.e.overwritten by trivial bits.Even with many copies of a quantum program,it can only be used for a finite amount of runs.This seems to be a drawback of quantum data,but it turns out to be the opposite.Quantum programs are secure and expensive,which stand as key distinctions from classical programs and memory,which can be perfectly cloned and reused forever,if no encryption or subscription is required (also see section 4).After a quantum program is executed and overwritten by trivial bits,it shall be restored by downloading it.

    A program shall not only be stored in memory,but also shall be downloadable from the internet.Although the internet is an extra object of a computer system,here we present a scheme to download quantum programs from an anticipated quantum internet [54].The downloading operation for the classical case contains the cloning of classical data and overwriting some amount of bits in the memory.For the quantum case,this cannot be done since quantum data cannot be cloned.Quantum programs are provided by quantum software vendors,who wish to keep the programs unknown to the agent.The quantum internet requires the communication of qubits.However,Holevo’s bound asserts that a qubit can communicate at most a single bit [55],consistent with the uncertainty principle and the no-cloning theorem.For a quantum program U,flying qubits such as photons can be prepared as the entangled state|ωU〉itself in principle,but the agent cannot use them to recover the quantum program U efficiently in its quantum memory.

    Fortunately,quantum cryptography [28]shows that bits can be securely communicated using qubits.Meanwhile,a quantum program U can be described by its classical information efficiently,if it is given as a sequence of gates composing a quantum circuit,∏?U?.Namely,given a universal gate set,the type of each gate(e.g.H,T,CX)can be encoded by two bits.The space-time location of an elementary gate can be encoded by bits efficiently.Therefore,the classical information of U contains the bits for the types and spacetime locations of the gates.For a circuit that is efficient with respect to the number n of qubits and accuracy ∈,the bit-string description of the gate sequence of U is efficient.Note that although it can be used to construct U,yet as a single matrix,U cannot be stored efficiently by bits in general.The bit-string description of U can be encrypted by a quantum software vendor,and securely communicated using qubits (or even using the post-quantum encryption [56]).After receiving the bit-string description,the agent,which is a quantum computer and is protected by encryption,can apply the gate sequence to restore the quantum program.The quantum program remains unknown to the agent,hence the program is securely downloaded and the quantum program is secure.In all,we demonstrated the viability of stored quantum programs,and we also remark that practical security is far more complicated than the primary scheme we presented here.

    Figure 5.Schematics of a tailed quantum circuit.The shaded box is a unitary operator.The curved wires contain the tails,which are arranged on the left side for the input.The multiple-controlled NOT gate (i.e.an n-fold Toffoli gate) is for the initial-state injection.The dotted gray wire is an example of a contraction on a head-tail pair.

    3.2.Tailed quantum circuits

    In accord with the stored quantum programs,we need to introduce a modification of the standard quantum circuit model,termed as tailed quantum circuit model.Recall that a quantum program |ωU〉 is a bipartite state,and we name the subsystem acted upon by U as ‘head’,and the other as ‘tail’.A tailed quantum circuit is a quantum circuit U of a sequence of quantum gates that act on a few qubits and the heads of a few ebits,while each tail is left unchanged.Without qubit input,a tailed quantum circuit is just a program state |ωU〉.The input for a program is injected into the circuit by making measurements on a few tails.The readout is specified by quantum measurement and supported on a few heads.The input is always carried by tails,output is carried by heads.See figure 5 for an example.

    Due to ebits,we can apply some novel operations with tailed quantum circuits.Given a collection of elementarytailed quantum circuits,they can be connected in series and parallel to form larger programs.The elementary tailed quantum circuits are those for elementary gates from universal gate sets.Familiar gates are Pauli gates X,Y,Z,and H,T,CZ,CX,CCX,CCZ,etc.We focus on H,T,and CZ as examples,see figures 6 and 7 for an example with simplified notations.They are all symmetric matrices,so they can act on either the upper or the bottom wire,but as a convention,we choose the upper one as the head.Using the UQT defined in section 3.1,smaller tailed circuits can be composed into larger ones,just as the composition of gates in a usual quantum circuit.

    A large program U ∈SU(d) can be stored with a ‘bold’high-dimensional tail of dimension d,or with a qubit tail for each qubit in the system when d is converted to 2nfor a number n.When there are multiple tails and heads,contraction(or fusion)of a pair can be made by a Bell measurement on them.A pair can be of any form,head-head,tail-tail,or head-tail.Cares are needed to properly choose the time flow after the input and output measurements are being made to avoid backward flow in time or closed time loops.The application of the contraction will be further discussed in section 6.

    Figure 6.The elementary quantum gates H,T,and CZ (left),their Choi states (middle),and simplified notations (right).

    Figure 7.An example of a quantum circuit realized by composition of elementary quantum programs for H,T,and CZ stored in the quantum memory.The compositions are denoted by gray wires.

    As quantum measurement outcome is random,a tailed quantum circuit can be employed to sample a collection of circuits.For each ebit,a measurement of Pauli Z on its tail injects either state|0〉or|1〉with equal probability,or in other words,a Pauli X byproduct that cannot be corrected.For the contraction of a pair of head and tail,the Bell measurement yields a connected wire but with Pauli byproduct X,Y,or Z that cannot be corrected either.The measurement outcomes are recorded so can be used to sample circuits with different initial states and final measurements.However,this also means that an initial state,e.g.a computational state=∣0 0 … 0〉,cannot be prepared deterministically.This is indeed true since a qubit state cannot be obtained deterministically from an ebit.To execute an algorithm on a tailed quantum circuit,we need a different input-injection scheme which is studied in the next subsection.

    3.3.Algorithmic universality

    Here we define a so-called algorithmic universality relative to tailed quantum circuits and show how to run quantum algorithms with tailed quantum circuits.Basically,it needs initialization,unitary evolution,and the readout measurement.The unitary operation is given as the program state.Suppose the input is required to be∣→〉,which is easier to illustrate than∣→〉.We define a binary measurement P={P0,P1} with P0=1-P1andP1=A qubit ancilla initialized at|0〉is needed to realize it.For n qubit tails,a n-fold Toffoli gate[57]is needed to copy the AND of all qubit values to the ancilla (see figure 5).The Z measurement on the ancilla realizes P:0 for P0,and 1 for P1.The n-fold Toffoli gate can be decomposed into a product of a polynomial number of elementary gates.In particular,it can be decomposed as a cascade of n-1 Toffoli gates with n-1 qubit ancilla.Furthermore,it is easy to see the probability for P1is 2-n,which is tiny.In other words,most of the time P0is realized.In this case,the output isof′ :=tr (O)-〈ψf∣O∣ψf〉f→orof=〈ψf∣O∣ψf〉as the true desired output,with∣ψf〉=The value ofof′ can be estimated by running the algorithm multiple times,as usually to be the case for quantum algorithms.Given thattr (O) is easy to compute,thenof=tr (O)-of′is obtained with high probability.

    The above demonstrates that any quantum algorithm that can be realized on a usual quantum circuit can also be realized on a tailed quantum circuit.This proves the universality of the tailed quantum circuit model,which we term here as an algorithmic universality since it is defined in the setting of quantum algorithms.In passing,probably a better term could be observational universality since it is due to the ability to compute observable values or a weak universality based on the weak operator topology on a Hilbert space [58].Furthermore,the algorithmic universality is actually more complete than the usual notion of universality,which does not take account of the cost of readout explicitly.For instance,some readout schemes cannot be done efficiently (with respect to ∈),such as the estimation of unknown gates [29]and an approximate stored-program scheme [31],which actually reduce the universality to a quasi universality [35].The algorithmic universality guarantees the universality of a model to realize quantum algorithms.

    The study above also extends to more general quantum algorithms.Just as quantum combs are able to describe general quantum operations,it is natural to see that they also describe more general types of quantum algorithms [41].A quantum comb takes a set of quantum objects {Qn} as input but uses quantum operations to change them into a desired output,with a quantum adversary as a resource.This forms a quantum meta-algorithm that designs a quantum algorithm by another quantum algorithm (the comb).The input {Qn} can be given as unitary oracles or known as black boxes.If they are given as stored programs{∣ωQn〉},we can use the composition scheme to connect them and form a comb.That is to say,we can implement a quantum comb using a stored-program scheme,see figure 8.Each unitary operator in the comb can be decomposed as a product of two,then an input object Qnsurrounded by two unitary operators is a block for a superchannel.Now for each∣ωQn〉we first apply a superchannelon it,and then we apply the composition of them in sequence to form the comb.In addition,the classicalquantum hybrid algorithms (see figure 4),which feed measurement results from Q to A,can be viewed as a special case of classical combs with the sequence of Qs as its input and the measurements and A as the comb.

    Figure 8.A quantum comb (bottom) and its realization by the composition on Choi states(top).The information flows towards the right for the circuit of a comb,while flows upwards for the composition.

    3.4.Quantum control unit

    The control unit (CU) is an important component of a computer system.In general,it interacts with all other components of a computer system,but usually,it does not carry the final solution to the given problems.It controls or monitors the procedure and progress of information processing during computation.For instance,it needs to guarantee that instructions from any algorithm are executed in the right order.Also,it needs to guarantee that data and programs are read and written at the right place in the memory.Besides universality,there is also a feature of modularity such that CU and CPU are independent components of a computer system.Here,we lay out the basic principle to design a quantum control unit(QCU),without going into details of the so-called control bus and data bus[47].We find there are freedoms that can be explored for its design.

    We first analyze the idea of control and quantum control from the viewpoint of algorithms.A control scheme is a procedure that aims to achieve a goal by applying a set of control items on a system.It can be understood algorithmically,but with different goals and costs from algorithms.Quantum control often uses a set of quantum operators to control a scheme to achieve an operational goal [59].The control operators may be supported by the target system itself,or not.It is straightforward to see that a general quantum control can be described as a quantum comb,with the adversary as the control.The controller becomes entangled with the target system in general,but it shall not contain final solutions.For instance,a common task in quantum control is to use external fields to control the states of atoms or electrons,which is often semi-classical since there is no entanglement between the fields and the systems.There are also controls with feedback.The simplest example is the CNOT gate,which is an entangling gate.In terms of Pauli operators,the target Pauli is also copied to the control qubit.Another example is using measurement on the target,and the outcome is fed back to the control,and this basically behaves as an iterative algorithm.

    Figure 9.The schematics to show the role of quantum control in a computation.

    In our model,the QCU is qubits and their interactions with other components.This includes the control of the composition of programs,the initial-state injection measurement,and readout measurement,see figure 9.We find there is a freedom to choose for the nature of the control.The minimal type is classical,namely,any quantum algorithm can be monitored classically.The classical control does not carry quantum information.On the other hand,the control can be as quantum as possible,and this is described as quantum combs.As a result,the control scheme could be an inevitable part of a quantum algorithm,and the design of quantum algorithms would involve a significant part of the controller.Actually,some quantum algorithms can be understood in this way,such as the quantum switch [60]and the linear combination of unitary operations [61,62].

    Furthermore,whenever the controller participates in the computation in a nontrivial way,the corresponding comb can be stored as a set of programs again.Then another level of control is required to realize this comb by composition.This eventually reduces the control to classical ones.Such a reduction of the control sequences or levels is similar to phenomena in other topics,such as algorithms and quantum measurements.For algorithms,we can always add a prealgorithm that designs the algorithm,no matter whether it is classical or quantum.For quantum measurement,there requires a cut to tell how a special value of an observable is obtained from a set of possible values,as originally studied by von Neumman [24].

    Therefore,we require a minimal or basic set of functions of a QCU.We shall make the QCU modular so it can be used for all quantum targets easily.The basic operation is the quantum control of a quantum operation,which is harder than classical control of a quantum operation,but easier than general entangling quantum operations.As the study of the no-control over unknown quantum operations in section 2.3 reveals that,an unknown quantum operation as a grey box can be controlled by qubits.Using qubits as control is a resource that can be explored,just as the quantum algorithms mentioned above demonstrated.With bits,each run of a quantum algorithm is a unitary U applying on a fixed initial state|ψi〉and a fixed readout of.With qubits,there could be a superposition of quantum algorithms by applying different compositions and measurements conditioned on the control qubits,i.e.different unitary,initial states,and readout can be realized in parallel and interfere.

    4.Features

    Our model of QCS requires both qubits and ebits (i.e.Bell states),Bell measurement and its generalization,and both unitary evolution and measurement play vital roles.The input does not have to be fixed at the beginning.The readout scheme avoids the problem in the setting of the no-programming theorem,which requires input as a separate state and the output is a state instead of measurement outcomes.A nontrivial POVM readout can be simulated by a unitary and a simple projective measurement from the dilation theorem.Quantum control in general requires multiple-controlled gates,which can be decomposed into elementary gates but that complicates the control process.The usage of ebits as quantum memory signifies the distinction between quantum information and classical information.It is protected by the uncertainty principle.Below we discuss our model in more detail to reveal its relations with other computing models or schemes,and its overall features,requirements,and limitations.

    First,we clarify the notion of a computer system.The universal computing model mainly refers to the framework to process information,while a computer system mainly refers to the architecture to divide and combine various aspects of information processing.A quantum computer system is a particular quantum system that is designed for computing tasks.Together with our formulation of universality,we emphasize the difference between quantum computing and a usual quantum evolution that occurs in nature every day.Quantum computing is usually formulated just as instrumentalists do: prepare an initial state,let it evolve,and then observe via measurement.This is an analog description.Instead,our study shows that quantum computing is more and needs to be almost fully digital.The states need to be encoded as qubits,programs encoded as ebits,and the final solution ofis carried by an observable,which can in principle be converted to bit strings such as using a quantum amplitude estimation algorithm [63].

    As has been mentioned,the current QCS is a quantum–classical hybrid,known as a quantum random-access machine[64],which contains both classical and quantum registers.The quantum data on the quantum registers would not be entangled with the control or program.In the original sense [6–8],our model of QCS is also not fully quantum,despite the usage of quantum control and quantum programs.For instance,we do not need a halt qubit to signal the end of a computation.Instead,a computation or an algorithm ends with measurements.Actually,the vital thing is not whether it is fully quantum or not;instead,it shall be its computational power and physical flexibility,such as being local and modular.As we have discussed for the quantum control,we can always shift the boundary between the quantum and classical parts.Also,we currently do not require the ability of the quantum query of all quantum data in superposition,like that in the scheme [65]for a quantum random-access memory.

    The QPU in our model is described by the quantum circuit model,which can be replaced by other universal models,such as quantum Turing machine and quantum cellular automata,which are the quantum versions of their classical analogs [41].Meanwhile,if we view the composition as a whole,it prepares matrix-product states or tensor-network states,which are universal forms of quantum states [66–68].This is linked with a local model of the quantum Turing machine[69]which prepares matrix-product states assisted by a quantum adversary.But here it is the quantum adversary (or edge) that carries the logical information.

    Our model can be viewed as an extension of quantum communication and cryptography by the universal computation on ebits and Choi states,besides qubits.The computation with Choi states introduces input by measurements,and mainly concerns the final expectation value ofof observable as output.If the input is treated as an initial state and carried by a separate system from the program,one has to use a highly entangled optimal program state,e.g.a generalized Choi state and global covariant measurement for the retrieval operation[29,31,51],which is constrained by the uncertainty principle.That is to say,our stored programs are protected by the uncertainty principle,namely,if an Eve or virus tries to obtain a stored program,a global measurement on many copies of it has to be applied with limited accuracy.

    Our model can also be seen as an extension of measurement-based quantum computing (MBQC) [70].In MBQC,the resource state does not contain the program;instead,the program is the measurement base.Each measurement is one-local and it is based on the U(1)symmetry of teleportation[71].The measurements are adaptive in order to avoid the byproduct of teleportation.The original universal blind quantum computing [72]is based on MBQC,which achieves blindness or security via pbits to hide measurement bases.The security relies on the computational difficulty of searching for the right program over a large set of possible ones.In fusion-based quantum computing [73],Bell measurements are used to grow graph states or stabilizer states,but there is no stored quantum programs.In our setting,we use two-local covariant measurements as an extension of Bell measurements,which do not contain the programs;instead,the programs are ‘pre-stored’ as quantum states.Our model has a close connection with valence-bond solids (VBS) [66](see section 6 for more details).As a result,we establish our model of QCS to be digital,universal,modular,and quantumsecure,and can also be made fault-tolerant.

    5.Fault tolerance

    In this section,we show how the QCS is consistent with the requirement of fault tolerance.The quantum fault-tolerance or threshold theorem states that universal quantum computation on logical qubits can be realized if the physical error rate for each logical qubit is below a threshold that is determined by the QEC[1].The QEC itself could also be noisy,whose effect is to reduce the threshold value.Physical gates to realize logical ones may also be imperfect,which are treated as perfect ones followed by noises.The fault tolerance is implicitly required by universality since between any two logical gates,U and V,QEC is needed to ensure the identity gate1 to formU1V.For a QCS,it also needs to replace qubits with logical qubits for all its components,including the memory,control,gates,measurements,etc.We find that the main issue is the fault tolerance of the composition operations.

    For the quantum memory,an ebit is replaced by a logical ebit,which can be efficiently prepared.If a code is defined by an isometry V,the logical ebit can be obtained as

    for |ω〉 as the encoded ebit.A logical stored program state|ωU〉Lis obtained by applying a logical gate U on |ω〉L.For a code[[n,k,d]],logical gates U commute with its projector P,[U,P]=0.For different codes,the form of U varies significantly.The composition of two logical program states|ωU〉Land |ωV〉Lis done by the logical version of the composition scheme,which is a UQT on 2n physical qubits.A qubit ancilla is needed for a composition,which in principle can use a different code.

    In the composition scheme,logical gates need to be symmetric to avoid the transposition of gates.This is a nontrivial requirement on logical gates.We find a concise scheme that satisfies the requirement.First,notice that the tensor product of symmetric gates is still symmetric.So it is easy to teleport transversal logical gates that are symmetric.It turns out the elementary gates are all symmetric such as logical H,T,and CZ.Then we can use the scheme of code switching[74]to combine the transversal logical gates from different codes.For instance,if there are two codes C1and C2that can be fault-tolerantly switched into each other by measuring their stabilizers,then their transversal logical gates can be combined together,even achieving universality[75].Then we can apply code switching and composition on them to form large programs.

    For composition,a gate Uadj∈SO(N2-1) for N=2nis needed to teleport a logical gate U.Such gates Uadjcan be efficiently done.However,they are not logical gates in general for the given codes.Actually,a sequence of compositions can be viewed as a code concatenation procedure,with the given codes as the inner codes,and the outer code being an SU(N) VBS edge code [35].Now the fault-tolerance of the composition is the fault-tolerance of the concatenation procedure,and this is also a common issue when just preparing a code.For a code defined by an encoding isometry V,there could be noises during the encoding itself.It could be hard to do QEC before the code is prepared,and the threshold theorem implicitly assumes that this can be done.For codes that the code projector P is composed of a product of smaller projectors P=∏nPn,e.g.for stabilizer codes [53]and codes defined by frustration-free Hamiltonians,each projector Pnis prepared gradually,hence can be used for QEC during the encoding or concatenation.

    Despite the similarity,there is also an important difference between the composition and code concatenation.In order to run a quantum algorithm,the VBS outer code does not have to be prepared firsthand.Instead,we can do an initial-state injection first,and then composite the first logical gate,then the second logical gate,and so on.The VBS outer code only appears in the time direction.Actually,this is similar to MBQC [70]and it reduces the idler time and QEC cost.To ensure fault tolerance,QEC is performed on the inner codes before and after the teleportation of each logical gate.Therefore,the fault tolerance is mainly determined by the inner codes for logical qubits and ebits.

    More generally,logical gates can be of higher depths.Ideally,we shall employ codes with some non-transversal high-depth logical gates as symmetric matrices,which currently we do not know of.This is left as an interesting task for the future.Nevertheless,there is a method to enforce fault tolerance by adapting the QEC dynamically during the time period of logical gates to account for the effects of the gate on the code.The issue is also encountered for the braiding of non-Abelian anyons[76].Suppose a logical gate UL=∏iUiis a sequence of symmetric non-logical gates Ui(note all elementary gates and their tensor products are symmetric).Each Uionly affects a code C locally,and it defines a new code Ci,which is stored separately.QEC can be performed for each Ci.When the gate sequence Uiis applied one after another,it induces a sequence of codes C[i],which is for gates U[i]=Ui…U2U1.The support of U[i]will be maximal in the middle of UL,and QEC becomes challenging but can be performed in principle.

    6.Extensions

    Before we conclude,we present a few direct extensions of our model.These are based on the key features or elements in our model,e.g.the usage of ebits,composition,and contraction operations.The extensions here can be used in our model,in principle,while their properties and applications remain intriguing.They could also be of independent interest for other tasks such as quantum simulation,quantum communication,and quantum error-correction codes.

    As for the circuit model,a quantum circuit can be imprinted on a geometric structure such as graphs or regular lattices.This also applies to the composition of programs,which can be extended from the one-dimensional flow to high-dimensional or structured flows.For instance,we showed that two qubit-gates are connected in parallel through a CZ gate,which requires the SU(2)-covariant gate teleportation.This can be extended to the SU(4)-covariant case by treating CZ and qubit gates on an equal footing.It can lead to interesting tensor-network states,also known as PEPS.See figure 10 for an example.Other Lie groups can also be used for the composition by treating the wires as representations.If the program states are arranged regularly,it can yield states with SPT orders[77].A special class of states is valence-bond solids [66]which have global Lie-group symmetry and weak SPT order.Indeed,if we start from empty program states,i.e.ebits,and use the projectors onto certain representations,this yields valence-bond solids,which,in this setting,shall be viewed as a herald of our composition network.It has been well established that valence-bond solids can be used for MBQC [78],with a program served by a sequence of measurement bases,which is classical.On the contrary,in our scheme here the program is quantum and has been pre-stored in the ebits,as we have discussed in section 4.

    Figure 10.An example of a portion of a high-dimensional composition of quantum programs.The big circles are SU(4)compositions,the small circles are SU(2) compositions.We have stretched the wires for H and T programs to be lines.The inclined bold segments are CZ gates.

    Figure 11.An example of a higher-order quantum circuit.The boxes are unitary gates.The dimension of each wire could be different.

    A generalization of the tailed quantum circuits is to use higher-order quantum operations [42–44],which is based on an iterative usage of the channel-state duality.For instance,a superchannel can also be converted into a Choi state and then acted upon by a channel of one higher order.They can all be properly represented by unitary quantum circuits.See figure 11 for an example.Recall that a channel is a 1-comb.One central difference between nth-order operations and ncombs is that the dimension of the former likely grows exponentially faster than the latter.That is,it is much harder to climb up the hierarchy by increasing the order than by adding more input channels to a comb.Despite this,higherorder quantum operations lead to interesting circuits with concatenated or nested structures,with each unitary being a‘nest.’ Nests on different levels of the hierarchy can be composed together leading to higher-order quantum combs.These nested circuits involve nonlocal gates acting on many wires and may be used to describe novel quantum dynamics.

    Using local gates and also the contraction operation,we introduce another type of circuit,called topological quantum circuits,as an extension of the tailed quantum circuits.Intuitively,an ebit together with a contraction forms a closed loop.A tailed quantum circuit with many tails and many contractions can be viewed as a complex of loops.These loops are linked or knotted together due to their interactions,i.e.quantum gates.From knot theory [79],a knot or link is formed by vertices (or crossings) and lines connecting them.A vertex contains a top wire and a bottom wire.Now we map a vertex to a type of circuit with two tails and two heads,together with possible qubit wires,and the gate in the circuit is not fixed.As a convention,we assign the top (bottom)wires as tails (heads).A segment between two vertices is mapped to a contraction.We can see primary examples in figure 12,while more complicated topological quantum circuits can also be constructed following the roles.Without additional qubits,each diagram is an overlap between a product of Choi states and a product of Bell states.If there are un-contracted qubits,a topological circuit,in general,prepares a multi-qubit entangled state,without direct interactions among the qubits.These entangled states are not appearing in the form of matrix-product states,and their properties are worth separate investigations.

    Figure 12.Primary examples of topological quantum circuits.From left to right,top to bottom: a circle,its circuit,and a circuit for two separate circles;a link,the circuit for a vertex,and the circuit for the link;a knot,and the circuit for the knot.The boxes are unitary gates.The dashed lines are contractions.Additional qubit wires for each box are not shown explicitly.

    7.Discussion and conclusion

    In this work,we present a primary model of a universal quantum computer system.Our study extends the current formation of quantum–classical hybrid computer systems,and it shows that there are proper quantum advantages for information storage,processing,protection,etc.In the meantime,a modern computer system is far more complicated than the original von Neumann architecture,and this provides challenging opportunities for further development of quantum computer systems.

    Our study highlights the role of the uncertainty principle,revealing the fundamental difference between classical and quantum information.The nature of quantum information is intriguing [80,81].Our model indicates that ebits (i.e.Bell states) are the elements for memory,while qubits are the elements for computation.On the contrary,classical bits are the elements for both classical computation and memory,while pbits are only used for computation.It also appears that ebits are the analog of bits,which is an echo of the fact that quantum teleportation is the analog of the one-time pad [82].Yet Bell states are entangled and nonlocal,which is not the case for bits.Furthermore,qubits are combinations of bits and pbits,and somehow are analog signals since the amplitudes in superposition are carried by qubits instead of being digitized into bit strings.In the so-called classical regime,the uncertainty principle also applies to the Fourier transform,which is often used to analyze signals.For the dynamics,we know that quantum computing generalizes permutation and stochastic operations to unitary operations followed by quantum measurements.However,there is no need to convert qubits or pbits into bits,and simulate unitary or stochastic operations by permutations.Quantum computing is still digital in the sense that any task can be decomposed into elementary gates and projective measurements acting on qubits and ebits.

    A key feature of our model is that the stored quantum programs are consumed after a computation.In order for the computer system to be reusable,the programs have to be restored by downloading from the internet,if renewing the hardware of the quantum memory were not advisable.Actually,the internet and communication network have become an indispensable part of the modern computing network.Therefore,an extension of our model is to include a quantum internet toward distributed quantum computing[54].A major merit of distributed computing is that it distributes or breaks a computational task into communication among several parts,each with fewer requirements on its computational power.As a whole,it can also be viewed as a restricted QCS,e.g.direct operations on two QCS are not available.This can be described by the local quantum Turing machine model [69],which has a close connection with matrix-product states and tensor-network states.This points to a viable connection between tensor-network states and quantum communication.

    We mentioned that we do not study QCS from the perspective of hardware,which requests various physical and engineering tasks.For instance,the quantum memory in our model is a collection of quantum states.In the sense of hardware,quantum memory refers to a hardware or device that can store quantum states,more precisely,store the quantum systems that carry quantum information.Devices for input and output are diverse and also require sophisticated information processing techniques,but in our study,they are basically bit strings generated by quantum measurements.QCS requires the understanding of physical problems including,but not limited to,dissipation,efficiency,energy cost,the role of fundamental laws,mechanism of almost all devices,etc.More broadly,like a giant artificial quantum system,QCS is a subject to reveal the interplay between quantum physics and modern technologies based on control,system,and information theory.

    Acknowledgments

    This work has been supported by the National Natural Science Foundation of China (Grant No.12 047 503 &No.12 105 343).Previous conversations with I Affleck,P Hayden,R Laflamme,H Nautrup,T Shi,Y Wang,J Watrous,Y Wu,Y Yang,S Yi,and G Zhu are acknowledged.

    欧美精品亚洲一区二区| 亚洲一级一片aⅴ在线观看| 色婷婷av一区二区三区视频| 精品久久蜜臀av无| 最黄视频免费看| 一级毛片 在线播放| 国产视频首页在线观看| 两个人看的免费小视频| 激情五月婷婷亚洲| 亚洲欧美一区二区三区国产| 赤兔流量卡办理| 看十八女毛片水多多多| 亚洲国产av新网站| 日韩欧美精品免费久久| 国产一区有黄有色的免费视频| 亚洲成色77777| 婷婷色综合大香蕉| 亚洲精品av麻豆狂野| 免费看av在线观看网站| 黄色视频不卡| 日韩精品有码人妻一区| 中文字幕av电影在线播放| 久久久久国产精品人妻一区二区| 亚洲欧美成人精品一区二区| 如日韩欧美国产精品一区二区三区| 黑人猛操日本美女一级片| 亚洲精品日本国产第一区| 91成人精品电影| 国产一区二区三区综合在线观看| 午夜av观看不卡| 国产亚洲欧美精品永久| 又粗又硬又长又爽又黄的视频| 美女中出高潮动态图| 一个人免费看片子| 精品亚洲成国产av| 久久精品熟女亚洲av麻豆精品| 高清视频免费观看一区二区| 精品国产一区二区三区久久久樱花| 久久99一区二区三区| 国产精品成人在线| 日韩一卡2卡3卡4卡2021年| 国产精品免费大片| 久久ye,这里只有精品| 精品少妇内射三级| 中文乱码字字幕精品一区二区三区| 欧美日韩av久久| 国产xxxxx性猛交| 中文字幕另类日韩欧美亚洲嫩草| 一本色道久久久久久精品综合| 一区二区三区乱码不卡18| 精品亚洲乱码少妇综合久久| 制服丝袜香蕉在线| 激情五月婷婷亚洲| 老汉色∧v一级毛片| 亚洲成av片中文字幕在线观看| 欧美日韩成人在线一区二区| 亚洲av电影在线观看一区二区三区| 97精品久久久久久久久久精品| 成人午夜精彩视频在线观看| 男女下面插进去视频免费观看| 久久久国产一区二区| 亚洲一区中文字幕在线| 亚洲精品久久成人aⅴ小说| 欧美精品一区二区大全| av天堂久久9| 麻豆乱淫一区二区| 亚洲国产日韩一区二区| 少妇人妻久久综合中文| 99久久人妻综合| 看十八女毛片水多多多| 国产一区二区在线观看av| 热re99久久国产66热| 成年av动漫网址| 波野结衣二区三区在线| 菩萨蛮人人尽说江南好唐韦庄| 午夜91福利影院| 9191精品国产免费久久| 男女午夜视频在线观看| 欧美精品人与动牲交sv欧美| 人人澡人人妻人| 日韩一区二区三区影片| 大香蕉久久网| 少妇人妻久久综合中文| a 毛片基地| 久热这里只有精品99| 日韩人妻精品一区2区三区| 欧美国产精品一级二级三级| 丝袜在线中文字幕| 波野结衣二区三区在线| e午夜精品久久久久久久| 国产在视频线精品| 热99久久久久精品小说推荐| 操出白浆在线播放| 亚洲婷婷狠狠爱综合网| 久久狼人影院| 又大又爽又粗| 少妇猛男粗大的猛烈进出视频| 国产深夜福利视频在线观看| 欧美在线一区亚洲| 国产激情久久老熟女| 最近2019中文字幕mv第一页| 亚洲精品美女久久av网站| av福利片在线| 久久精品亚洲熟妇少妇任你| 亚洲,欧美精品.| 国产熟女午夜一区二区三区| 午夜日韩欧美国产| av在线老鸭窝| 大香蕉久久成人网| 欧美日韩国产mv在线观看视频| 午夜福利视频在线观看免费| 丝袜人妻中文字幕| 日日摸夜夜添夜夜爱| 精品人妻一区二区三区麻豆| 视频在线观看一区二区三区| 久久综合国产亚洲精品| 精品亚洲成国产av| 亚洲精品,欧美精品| 校园人妻丝袜中文字幕| 午夜福利视频在线观看免费| 在线观看免费日韩欧美大片| 午夜91福利影院| 欧美97在线视频| 亚洲一区二区三区欧美精品| 91精品国产国语对白视频| 国产乱人偷精品视频| 肉色欧美久久久久久久蜜桃| 成人漫画全彩无遮挡| 国产精品久久久久久久久免| 亚洲欧美精品自产自拍| 人人妻人人添人人爽欧美一区卜| 免费黄频网站在线观看国产| 国产精品偷伦视频观看了| 久久青草综合色| 人人妻,人人澡人人爽秒播 | 天天躁狠狠躁夜夜躁狠狠躁| 超色免费av| 日日摸夜夜添夜夜爱| 精品人妻一区二区三区麻豆| 欧美亚洲 丝袜 人妻 在线| 亚洲 欧美一区二区三区| 精品亚洲乱码少妇综合久久| 免费高清在线观看视频在线观看| 午夜91福利影院| 国产精品香港三级国产av潘金莲 | av一本久久久久| 国产精品久久久久久精品古装| 久久久久久久久久久免费av| 欧美少妇被猛烈插入视频| 国产精品久久久久久精品古装| 久久女婷五月综合色啪小说| 久久午夜综合久久蜜桃| 丁香六月天网| 国产精品成人在线| 亚洲国产最新在线播放| 国产成人一区二区在线| 成年女人毛片免费观看观看9 | 中文字幕亚洲精品专区| 交换朋友夫妻互换小说| 天美传媒精品一区二区| 在线 av 中文字幕| 自线自在国产av| 久久精品熟女亚洲av麻豆精品| 90打野战视频偷拍视频| 哪个播放器可以免费观看大片| 亚洲av福利一区| 精品卡一卡二卡四卡免费| 亚洲精品国产区一区二| 国产又色又爽无遮挡免| 51午夜福利影视在线观看| 国产精品秋霞免费鲁丝片| 国产成人av激情在线播放| 亚洲五月色婷婷综合| 免费少妇av软件| 天天添夜夜摸| 亚洲一卡2卡3卡4卡5卡精品中文| 丰满迷人的少妇在线观看| 国产精品一区二区精品视频观看| 精品国产一区二区三区四区第35| 欧美日韩亚洲综合一区二区三区_| 久久久精品国产亚洲av高清涩受| 人人澡人人妻人| 久久久久久免费高清国产稀缺| 伦理电影大哥的女人| 久久久久视频综合| 亚洲精品在线美女| 永久免费av网站大全| 久久久久久久久免费视频了| 国产又爽黄色视频| 久久精品久久久久久噜噜老黄| 亚洲精品日本国产第一区| 最近最新中文字幕免费大全7| 在现免费观看毛片| 尾随美女入室| 国产亚洲欧美精品永久| 国产在线一区二区三区精| 亚洲国产欧美一区二区综合| av电影中文网址| kizo精华| 别揉我奶头~嗯~啊~动态视频 | 一区二区三区四区激情视频| 国产精品久久久人人做人人爽| 欧美日韩一级在线毛片| 国产亚洲av高清不卡| 女性生殖器流出的白浆| 亚洲国产中文字幕在线视频| 高清在线视频一区二区三区| 日本av免费视频播放| 无限看片的www在线观看| 熟女av电影| 桃花免费在线播放| 欧美成人精品欧美一级黄| 精品国产露脸久久av麻豆| 日本猛色少妇xxxxx猛交久久| 欧美乱码精品一区二区三区| 亚洲第一青青草原| 免费不卡黄色视频| 欧美人与性动交α欧美软件| 在线精品无人区一区二区三| 免费av中文字幕在线| 久久人人97超碰香蕉20202| 久久久久久久久久久久大奶| 一区二区三区乱码不卡18| 午夜福利,免费看| 日韩大片免费观看网站| 成年av动漫网址| 日韩av不卡免费在线播放| 亚洲成人手机| 99re6热这里在线精品视频| 中文字幕色久视频| 久久久久久人人人人人| 老鸭窝网址在线观看| 卡戴珊不雅视频在线播放| 午夜免费观看性视频| 亚洲av成人精品一二三区| 精品少妇一区二区三区视频日本电影 | 欧美日韩综合久久久久久| 成人漫画全彩无遮挡| 国产精品麻豆人妻色哟哟久久| 香蕉国产在线看| 在现免费观看毛片| 国产有黄有色有爽视频| 欧美日韩视频高清一区二区三区二| 亚洲国产毛片av蜜桃av| 在线观看免费午夜福利视频| 黄网站色视频无遮挡免费观看| 欧美日韩亚洲综合一区二区三区_| 精品一区二区三区av网在线观看 | 国产精品秋霞免费鲁丝片| 国产亚洲av高清不卡| 久久人妻熟女aⅴ| 久久久久久久精品精品| 日韩精品免费视频一区二区三区| 亚洲免费av在线视频| 亚洲熟女毛片儿| 国产欧美亚洲国产| 午夜老司机福利片| 无限看片的www在线观看| 青春草视频在线免费观看| 午夜av观看不卡| 美国免费a级毛片| av在线老鸭窝| 天堂中文最新版在线下载| 欧美日韩亚洲国产一区二区在线观看 | 国产淫语在线视频| 久久天躁狠狠躁夜夜2o2o | 日日摸夜夜添夜夜爱| 国产深夜福利视频在线观看| 精品免费久久久久久久清纯 | 欧美亚洲 丝袜 人妻 在线| 日日爽夜夜爽网站| 国产日韩欧美在线精品| 国产精品国产三级专区第一集| 国产免费视频播放在线视频| 日日啪夜夜爽| 欧美精品一区二区大全| 中国国产av一级| 久久久久久免费高清国产稀缺| 九草在线视频观看| 成人国产麻豆网| 我要看黄色一级片免费的| avwww免费| 只有这里有精品99| 国产99久久九九免费精品| 伊人久久大香线蕉亚洲五| 最近中文字幕2019免费版| 精品午夜福利在线看| 下体分泌物呈黄色| 男女床上黄色一级片免费看| 少妇人妻 视频| 不卡av一区二区三区| 80岁老熟妇乱子伦牲交| 看非洲黑人一级黄片| av不卡在线播放| 国产不卡av网站在线观看| 少妇被粗大猛烈的视频| 美女视频免费永久观看网站| 成人手机av| 欧美日韩av久久| 免费观看av网站的网址| 中文字幕精品免费在线观看视频| 大陆偷拍与自拍| 国产成人免费无遮挡视频| 男女床上黄色一级片免费看| 9色porny在线观看| 免费在线观看完整版高清| 国产男女内射视频| 欧美97在线视频| 日韩大片免费观看网站| 丝袜喷水一区| 国产精品亚洲av一区麻豆 | 高清av免费在线| 精品亚洲乱码少妇综合久久| 极品人妻少妇av视频| 999精品在线视频| 婷婷色麻豆天堂久久| 国产老妇伦熟女老妇高清| 精品国产露脸久久av麻豆| 午夜福利视频精品| 成人免费观看视频高清| 久久韩国三级中文字幕| 久久鲁丝午夜福利片| 亚洲精品国产一区二区精华液| 国产精品久久久久久久久免| 满18在线观看网站| 久久久久精品国产欧美久久久 | 婷婷色麻豆天堂久久| 久久精品久久精品一区二区三区| 国产乱人偷精品视频| 母亲3免费完整高清在线观看| 两个人看的免费小视频| 女人高潮潮喷娇喘18禁视频| 欧美精品一区二区大全| 高清不卡的av网站| 少妇精品久久久久久久| 欧美日韩成人在线一区二区| 亚洲欧美一区二区三区久久| av视频免费观看在线观看| 少妇被粗大猛烈的视频| 亚洲一区中文字幕在线| 91精品三级在线观看| 国产男人的电影天堂91| 国产精品久久久久久久久免| 狠狠婷婷综合久久久久久88av| 激情五月婷婷亚洲| 极品少妇高潮喷水抽搐| 如日韩欧美国产精品一区二区三区| 欧美成人午夜精品| 亚洲人成电影观看| 妹子高潮喷水视频| 波多野结衣一区麻豆| 亚洲精品在线美女| 69精品国产乱码久久久| 久久久久久久大尺度免费视频| 如日韩欧美国产精品一区二区三区| 国产精品一二三区在线看| 亚洲精品视频女| 五月天丁香电影| 黄频高清免费视频| 老司机亚洲免费影院| 亚洲欧美一区二区三区黑人| 男人爽女人下面视频在线观看| 精品免费久久久久久久清纯 | 亚洲国产毛片av蜜桃av| 自拍欧美九色日韩亚洲蝌蚪91| 丝袜喷水一区| 成人三级做爰电影| 考比视频在线观看| 成人影院久久| 欧美人与善性xxx| 久久久久久久久免费视频了| 亚洲国产日韩一区二区| 嫩草影院入口| 国产精品av久久久久免费| 天天躁日日躁夜夜躁夜夜| 夫妻性生交免费视频一级片| 一本久久精品| 男女下面插进去视频免费观看| 成年人午夜在线观看视频| 大话2 男鬼变身卡| 国产黄色视频一区二区在线观看| av在线观看视频网站免费| 性色av一级| 大香蕉久久成人网| 晚上一个人看的免费电影| 在线观看免费午夜福利视频| 国产乱人偷精品视频| 操美女的视频在线观看| tube8黄色片| 久久久久国产一级毛片高清牌| 国产又爽黄色视频| 午夜激情久久久久久久| 久久毛片免费看一区二区三区| 亚洲欧洲精品一区二区精品久久久 | 国产女主播在线喷水免费视频网站| 国产精品嫩草影院av在线观看| 午夜福利网站1000一区二区三区| 最近2019中文字幕mv第一页| 亚洲精品,欧美精品| 妹子高潮喷水视频| bbb黄色大片| 乱人伦中国视频| 一级毛片 在线播放| 欧美精品高潮呻吟av久久| 久久久久视频综合| 人妻 亚洲 视频| 中文字幕最新亚洲高清| 不卡视频在线观看欧美| 亚洲成人手机| 亚洲欧美精品自产自拍| 美女国产高潮福利片在线看| 色精品久久人妻99蜜桃| 精品国产超薄肉色丝袜足j| 中文欧美无线码| 国产精品久久久久久精品古装| 欧美日韩一级在线毛片| 精品亚洲成a人片在线观看| 中国三级夫妇交换| 午夜免费观看性视频| 久久久久人妻精品一区果冻| 捣出白浆h1v1| 人妻人人澡人人爽人人| 欧美在线一区亚洲| 激情视频va一区二区三区| 免费观看a级毛片全部| 久久人人97超碰香蕉20202| 亚洲av男天堂| 美女中出高潮动态图| www.熟女人妻精品国产| 国产在线视频一区二区| 9191精品国产免费久久| 亚洲精品aⅴ在线观看| 一级a爱视频在线免费观看| 亚洲人成电影观看| 亚洲精品国产av蜜桃| av片东京热男人的天堂| 欧美97在线视频| 伦理电影免费视频| 日本黄色日本黄色录像| 国语对白做爰xxxⅹ性视频网站| 成年美女黄网站色视频大全免费| 97精品久久久久久久久久精品| 中文欧美无线码| 男人舔女人的私密视频| 日韩中文字幕视频在线看片| 亚洲视频免费观看视频| 久久国产亚洲av麻豆专区| 国产有黄有色有爽视频| 国产精品免费视频内射| 亚洲一卡2卡3卡4卡5卡精品中文| 在线观看人妻少妇| 国产精品秋霞免费鲁丝片| 波多野结衣av一区二区av| 美女扒开内裤让男人捅视频| 尾随美女入室| 大片免费播放器 马上看| 肉色欧美久久久久久久蜜桃| 少妇 在线观看| 亚洲天堂av无毛| 韩国精品一区二区三区| 大片电影免费在线观看免费| 亚洲国产精品999| 黄色毛片三级朝国网站| 亚洲欧美精品自产自拍| 国产精品国产三级国产专区5o| 日本色播在线视频| 久久国产精品大桥未久av| 一二三四中文在线观看免费高清| 亚洲五月色婷婷综合| 亚洲人成网站在线观看播放| 精品久久久久久电影网| 热re99久久精品国产66热6| 欧美在线一区亚洲| 午夜福利影视在线免费观看| 国产成人精品福利久久| 如日韩欧美国产精品一区二区三区| 一级黄片播放器| 天堂中文最新版在线下载| 丰满少妇做爰视频| 亚洲av日韩精品久久久久久密 | 婷婷色麻豆天堂久久| 国产精品免费视频内射| 欧美精品人与动牲交sv欧美| 一边摸一边抽搐一进一出视频| 久久精品人人爽人人爽视色| 啦啦啦在线免费观看视频4| 99国产精品免费福利视频| 久久热在线av| 亚洲国产精品999| 成人漫画全彩无遮挡| 亚洲欧美成人精品一区二区| 激情五月婷婷亚洲| 久久久精品免费免费高清| √禁漫天堂资源中文www| 一区福利在线观看| 日本猛色少妇xxxxx猛交久久| 久久狼人影院| 欧美中文综合在线视频| 欧美黑人精品巨大| 欧美另类一区| 久久久精品免费免费高清| 大片电影免费在线观看免费| 国产不卡av网站在线观看| 男男h啪啪无遮挡| 天天操日日干夜夜撸| 久久久久久免费高清国产稀缺| 日日撸夜夜添| 亚洲欧美成人精品一区二区| 99九九在线精品视频| 久久久亚洲精品成人影院| 久久久久久久国产电影| 中文精品一卡2卡3卡4更新| 熟女av电影| 在线观看免费日韩欧美大片| 999久久久国产精品视频| 又粗又硬又长又爽又黄的视频| 亚洲成av片中文字幕在线观看| 一本久久精品| 91国产中文字幕| 新久久久久国产一级毛片| 国产片内射在线| 国产成人精品在线电影| 欧美精品亚洲一区二区| 人人妻人人澡人人看| 日韩精品免费视频一区二区三区| 亚洲精品av麻豆狂野| 欧美在线一区亚洲| 久久久久久久国产电影| 欧美中文综合在线视频| 亚洲av日韩精品久久久久久密 | 飞空精品影院首页| 成人三级做爰电影| 黄色视频不卡| 国产 精品1| 国产国语露脸激情在线看| 精品一品国产午夜福利视频| 高清不卡的av网站| 母亲3免费完整高清在线观看| 午夜精品国产一区二区电影| 国产亚洲午夜精品一区二区久久| www.av在线官网国产| 中文乱码字字幕精品一区二区三区| 久久久亚洲精品成人影院| 亚洲欧美激情在线| 日本色播在线视频| 男女无遮挡免费网站观看| 我的亚洲天堂| 90打野战视频偷拍视频| 老司机深夜福利视频在线观看 | 男女之事视频高清在线观看 | 涩涩av久久男人的天堂| 精品第一国产精品| 久久人妻熟女aⅴ| 国产成人欧美| 成人三级做爰电影| 女性生殖器流出的白浆| 亚洲精品第二区| 桃花免费在线播放| 中文字幕人妻丝袜一区二区 | 国产黄频视频在线观看| tube8黄色片| 亚洲精品久久午夜乱码| 天天操日日干夜夜撸| 免费黄网站久久成人精品| 一级毛片电影观看| 亚洲成人av在线免费| 青春草国产在线视频| 女人精品久久久久毛片| 欧美黑人欧美精品刺激| 老司机亚洲免费影院| 精品国产乱码久久久久久小说| 久热这里只有精品99| 99九九在线精品视频| 国产黄频视频在线观看| 国产xxxxx性猛交| 国产1区2区3区精品| 天天躁夜夜躁狠狠久久av| 日韩制服丝袜自拍偷拍| 青春草亚洲视频在线观看| 丝袜美腿诱惑在线| 999精品在线视频| 午夜久久久在线观看| 久久国产精品大桥未久av| 在线观看www视频免费| 各种免费的搞黄视频| 19禁男女啪啪无遮挡网站| 亚洲欧美精品综合一区二区三区| 国产成人91sexporn| 深夜精品福利| 下体分泌物呈黄色| 日本vs欧美在线观看视频| 亚洲,欧美精品.| 五月天丁香电影| 国产精品秋霞免费鲁丝片| 黄片小视频在线播放| 国产老妇伦熟女老妇高清| 国产精品秋霞免费鲁丝片| 国产伦理片在线播放av一区| 女性被躁到高潮视频| 国产精品秋霞免费鲁丝片| 人妻一区二区av| 男人爽女人下面视频在线观看| 精品一区二区三区四区五区乱码 | 90打野战视频偷拍视频| 一区二区三区激情视频| 又粗又硬又长又爽又黄的视频| 90打野战视频偷拍视频| 啦啦啦啦在线视频资源| 国产男女内射视频| 99精国产麻豆久久婷婷| 亚洲精品中文字幕在线视频| 欧美中文综合在线视频| 国产av码专区亚洲av| 久久久久久人人人人人| 国产高清国产精品国产三级|