• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    A prototype of quantum von Neumann architecture

    2022-10-22 08:14:48DongShengWang
    Communications in Theoretical Physics 2022年9期

    Dong-Sheng Wang

    CAS Key Laboratory of Theoretical Physics,Institute of Theoretical Physics,Chinese Academy of Sciences,Beijing 100190,China

    Abstract A modern computer system,based on the von Neumann architecture,is a complicated system with several interactive modular parts.It requires a thorough understanding of the physics of information storage,processing,protection,readout,etc.Quantum computing,as the most generic usage of quantum information,follows a hybrid architecture so far,namely,quantum algorithms are stored and controlled classically,and mainly the executions of them are quantum,leading to the so-called quantum processing units.Such a quantum–classical hybrid is constrained by its classical ingredients,and cannot reveal the computational power of a fully quantum computer system as conceived from the beginning of the field.Recently,the nature of quantum information has been further recognized,such as the no-programming and no-control theorems,and the unifying understandings of quantum algorithms and computing models.As a result,in this work,we propose a model of a universal quantum computer system,the quantum version of the von Neumann architecture.It uses ebits (i.e.Bell states) as elements of the quantum memory unit,and qubits as elements of the quantum control unit and processing unit.As a digital quantum system,its global configurations can be viewed as tensor-network states.Its universality is proved by the capability to execute quantum algorithms based on a program composition scheme via a universal quantum gate teleportation.It is also protected by the uncertainty principle,the fundamental law of quantum information,making it quantum-secure and distinct from the classical case.In particular,we introduce a few variants of quantum circuits,including the tailed,nested,and topological ones,to characterize the roles of quantum memory and control,which could also be of independent interest in other contexts.In all,our primary study demonstrates the manifold power of quantum information and paves the way for the creation of quantum computer systems in the near future.

    Keywords: quantum computation,quantum channel,von Neumann architecture

    1.Introduction

    In quantum computing,we often apply sequences of unitary operations on multi-qubit states,followed by measurements.This is described in the quantum circuit model,the most popular model for universal quantum computing[1].Being universal is not only vital to prove its own consistency [2–4],but also to demonstrate its power relative to conventional computing.However,the quantum circuit model is not complete so far in the sense that it does not provide a quantum computer system,the quantum version of the von Neumann architecture of modern computers [5].A modern computer system contains at least five modular components: the input,output,memory unit,control unit,and computing unit (also known as a central processing unit).In particular,the memory contains stored programs,which enables the power of modern classical computers to automate the execution of algorithms.The current paradigm for quantum computing is a quantum–classical hybrid: the quantum circuit model mainly serves as a quantum central processing unit,which is usually classically controlled with quantum algorithms stored as classical programs.There are excessive amounts of classical ingredients which appear inevitable.

    There have been persistent efforts to go beyond the scope of the circuit model,even starting from the beginning of quantum information.In the setting of a quantum Turing machine,it was pursued if quantum computing can be fully quantum[6–8],i.e.with all components including the read-write head,the address of qubits,programs,control,halt signal,etc being quantum.It was then discovered that programs cannot be made quantum in the sense that once a program is stored as a quantum state,it cannot be read out deterministically[9].An obstruction for the quantum control over arbitrary quantum operations is also revealed lately [10–13].These studies together with other no-go theorems,e.g.[14–23],illustrate the sharp distinction between quantum information and classical ones.

    The difficulty to formalize a universal quantum computer system is linked to a vital issue of quantum physics.It concerns if there is a so-called quantum–classical boundary,and how or where to draw such a boundary[24].From the modern theory of quantum decoherence [25],classicality arises if the coherence of a quantum system is lost or delocalized into another system.As the elements of quantum information,qubits are considered to be the extensions of bits and probabilistic bits (or pbits),in the sense that a qubit is a superposition of bit values,and it leads to pbits if it is measured.This heuristic indicates that,instead of being puzzled by the nature of quantumness,the central issue for a proper model of a quantum computer system is to unfold the quantum advantages for various information processing tasks.

    In this work,we propose a prototypical model of a universal quantum computer system.The central ingredient is a stored-program scheme based on the quantum channel-state duality [26,27].The stored quantum programs can be composed together,processed into other ones,and executed to realize quantum algorithms.Our model is not only universal and modular but also quantum-secure,in the sense that it is protected by the uncertainty principle,which has played vital roles in quantum communication and cryptography [28].

    Our work is made possible based on a few recent progressions.First,the essence of some no-go theorems becomes clearer,including the no-programming [29–31],no-control[12],and the incompatibility between transversality and universality of logical gates [32–39].The linearity of quantum operations and fundamental constraints by the uncertainty principle are revealed.Meanwhile,a scheme using Choi states as stored quantum programs is proposed[40],which turns out to be the proper way to bypass the accuracy constraint by the uncertainty principle.Also,we recently presented a physical understanding of various universal computing models[41].In particular,we pointed out the relation between the uncertainty principle and logical gates,and the relation between quantum algorithms and quantum combs [42–46].These progresses,but not limited to,enable the formation of a universal quantum computer system with less classical ingredients.

    1.1.Overview of our model

    Here we provide an overview of the model of a quantum computer system (QCS),which shares similarities with the classical case but also shows key distinctions.As for the classical case,there are five modular components: the input,output,memory unit,control unit (CU),and central processing unit (CPU).See figure 1.We treat the CU as a separate part from the CPU.We only focus on the functionality of these components,e.g.how they work and relate with each other.We do not study devices or hardware in this paper which should be specified for a practical QCS.This will be further discussed in section 7.

    Figure 1.The five primary components of a computer system: the input,output,memory unit,control unit,and central processing unit.Their relations in terms of control and information flows are not shown explicitly here.More details can be found in computerscience textbooks,e.g.[47].

    A modern CPU has a few components such as its own memory and control,but here we treat it as an arithmetic unit and study the quantum version,the quantum processing unit(QPU).A QPU contains at least two parts:the qubits required to perform quantum circuits,and the devices that are needed to realize quantum gates on the qubits and qubits from the memory.The quantum memory stores data and programs,both are in terms of Choi states [26,27].Quantum programs are stored as many copies of Choi states of quantum operations.Quantum data are stored as many copies of Choi states of preparation circuits for states.In our model,a computation is carried out on a part of memory under the control of a quantum control unit (QCU),which contains a collection of qubits.A large program is formed by the composition of small programs from the memory.The initial input state is‘injected’into the program by measurements.The solution to a given problem is obtained by measurements of observable on the final state.

    Compared with classical cases,there are two major differences.First,due to the uncertainty principle,quantum data can be made secure,termed as‘quantum-secure’in this work,hence cannot be cloned or estimated efficiently.Second,quantum measurements are interactive with random outcomes.After a computation,the stored programs are consumed but can be restored.A quantum eavesdropper(Eve)or virus can destroy the programs by local measurements without knowing the programs,or,if powerful,can do joint measurements on a few copies to estimate a program state,for which the accuracy is limited by the uncertainty principle.On the contrary,classical data can be cloned if not encrypted,and classical measurements (e.g.read-write operations) are usually deterministic.This not only harvests quantum evolution as a computational resource but also harvests quantum memory and quantum measurements as resources.

    Using stored quantum programs provides advantages especially when this cannot be efficiently done classically,but also leads to a few challenges.First,in order to execute a stored program or algorithm exactly and deterministically,the input to the algorithm is prepared in a heralded way.The output of an algorithm is required to be expectation values of observables,instead of being the final state itself.It appears that quantum computing occurs in Hilbert spaces,but eventually,the information carried by quantum states has to be read out by measurements,i.e.we have to convert qubits into bits to obtain the solution to a given problem.This leads to our refinement of universality to be algorithmic (see section 3).Also due to the requirement of fault-tolerance,there will be the potential overhead of quantum error correction on the quantum memory (see section 5).This also makes a quest for the finding of fully or partially self-correcting qubits [48].Our study proves that a QCS,as the analog of the classical ones,can be established in principle.

    This work contains the following parts.In section 2 we survey the primary tools including quantum channels,quantum combs,quantum error correction,the quantum circuit model and quantum algorithms,and a few no-go theorems and their relations with the uncertainty principle.In section 3 we explain the main ingredients for our model of QCS,including the stored quantum programs and data,an extension of quantum circuits by stored programs,which are defined as tailed quantum circuits,a definition of algorithmic universality to describe the execution of quantum algorithms,and a description of the quantum control unit.We further discuss the features and requirements of the model in section 4,and its relation with some other models.In section 5 we show that QCS can be made fault-tolerant,hence completing the formalization of universal QCS.Finally,in section 6 we briefly discuss a few extensions of our study and conclude with more problems relating to QCS in section 7.

    2.Preliminary

    In this section,we review the primary background to make our presentation self-consistent.Along the way,we clarify facts and draw connections that are relevant to our study of QCS.

    2.1.Quantum operations

    We consider finite-dimensional Hilbert spaces.A pure state|ψ〉is an element of a Hilbert spaceH with the normalization〈ψ|ψ〉=1 and any global phase is unphysical.A mixed state or density operatorρ∈D (H) is a nonnegative semidefinite operator acting onH withtrρ=1,forD (H) ?B (H) as the convex set of all mixed states,B (H)as the space of bounded linear operators acting onH.A simple way to distinguish mixed states from pure states is by the purity

    which only equals to 1 for pure states.The purity is preserved under unitary evolution,which is described by unitary operatorsU∈U (H) in the unitary group U (H) acting onH.More general evolution is described as completely positive,trace-preserving (CPTP) maps [49]of the form

    Figure 2.Quantum circuit diagrams (from top to bottom,left to right) for a quantum channel,Choi state,composition of two Choi states,unitary dilation of a channel,initial-state injection scheme on a Choi state,and superchannel acting on a Choi state.The curved wires are ebits,boxes are quantum operations,their meanings shall be clear from the main text.

    for ?ρ∈D (H),also known as quantum channels,and Kiknown as Kraus operators.This is also called a Kraus operator-sum representation,which is not unique due to an isometric degree of freedom.The minimal number of Kraus operators is the rank of the channel.A positive operatorvalued measure(POVM)is a set{Fi}with Fi≥0,∑iFi=1.It can be constructed from Kraus operators withFi=Ki?Ki.A quantum instrument {Φi} is a set of CP maps Φiso that the sum of them Φ=∑iΦiis TP,and the set of indices[i]is fixed.A quantum channel E : D (H1)→D (H2) does not need to preserve the dimensions of Hilbert spaces,but for simplicity,our presentation is made for the dimension-preserving case without loss of generality.We use E: D (H) to represent a channelE that acts onD (H).

    Any quantum channel E: D (H) can be represented as its dual state

    usually known as a Choi state [26,27],for ω:=|ω〉〈ω|,andd=dim(H).The state |ω〉 is a Bell state,also known as an ebit.Kraus operators can be found from the eigenvalue decomposition ofωE.Choi states are bipartite and for clarity,we label them as site A and site B in order.The partial trace of a Choi state is constrained as trAωE=and trBωE=GivenωE,the action of the channel can be obtained as

    for ρtas the transpose of a stateρ∈D (H).

    We see that ω is the dual state of1.There is a concise graphical way to illustrate this map,see figure 2.For an operatorA∈B (H),define its vectorization as

    which has the property|ωA〉=1 ?At|ω〉.The vectorization or duality is just to bend over the input towards the bottom of the output wire.This can be generalized if the given system is multi-partite.For n-partite operators,|ω〉?nis needed and it holds

    for=RAt R,R is the unitary operation that reverses the order of the subsystems.For the bipartite case,R is the swap operation.The relation above can be seen as to shuffle the operator A along the wires from the top to the bottom.Alternatively,an n-partite operatorA∈B (H) can be just treated as a single partite,and we can use a high-dimensional Bell state ∣ω〉 ∈H ?H to define the vectorization.In this case,=At.Despite the two choices,we still view the Choi state of an operator as a unique definition.

    The general actions on Choi statesωE∈ C (H ? H)?D (H ?H) are found to be superchannels [42–44],which again can be represented by their dual states.To describe them,we use the unitary dilation representation of them which is more appropriate for the quantum circuit model.For a channel E: D (H),from dilation,it can be realized by a unitary U with

    for U as the superoperator form of a unitary U,the trace over an ancilla at an initial state|0〉,which realizes Kraus operators as Ki=〈i|U|0〉,with {|i〉} as states of the ancilla.In order to tell channels from superchannels,we use a hat on the symbols for superchannels.A superchannel: C (H ?H) can be realized as

    forρ∈D (H),E: D (H),U andV are unitary,and a is an ancilla.Note that the dimension of V can be larger than U,while here we find no need to provide the details of the ancilla.The Choi stateωEcan be made explicit by bending over the input wires,see figure 2,with

    where the support of each operator shall be easy to see hence omitted for simplicity.The trace is over the subsystems except for the top one,A.The unitaryis the transpose of U conjugated by a swap.This formalism for superchannels includes channels as a special case with no channelE as input and no.We see that in order to change a channel to another one,we have to use both a pre-and post-unitary operations,with a memory wire connecting them.More generally,quantum n-combs are defined when (n-1) channels are taken as input sandwiched between unitary operations[42–46].As such,states,channels,and superchannels are also called 0-combs,1-combs,and 2-combs,respectively.

    In quantum computing,an important type of quantum operation is quantum error correction (QEC),which corrects errors that occur on quantum error-correction codes (QECC).A quantum code is often defined by an encoding isometryV: HL→HP,with V?V=1,or by the projector P=VV?on the code space,C ?HP.A set of error operators {Ei} acting on a code P is correctable when

    and [cij]:=ρPcan be viewed as a state.The correction or recovery scheme,R,is defined as a set {Rk} withRk=PFk?for dkas eigenvalues of ρP,and FksatisfiesPFk?F?P=dkδk?P.When the error operators form a channel,N,the logical information is perfectly recovered RN(∣ψ〉)=∣ψ〉, ?∣ψ〉 ∈C.In addition,the condition for error-detection by P is PEiP=eiP,weaker than the QEC condition.

    We see that QEC is to find the inverse of a map N,which does not exist in general but is possible when its action on a subspaceC is concerned.The QEC condition(10) is actually more powerful:any set of operators{Ai}with each Aias a linear combination from{Ei}can also be corrected byR.This is often known as the linear Kraus-span property as the error operators are considered as Kraus operators for channels.For codes with tensor-product form HP=?nHn,we only need to consider a spanning set of errors for each subsystem n,as others are linear combinations of them.For multi-qubit codes,we often consider Pauli bit-flip error X and phase-flip error Z for each qubit,with Y as a product of them,and that is sufficient to characterize the primary error-correction features of a code,such as code distance and threshold.A QECC is usually denoted as C=[[n,k,d]],which uses n physical qubits to encode k logical qubits,and has a distance d=2t+1,namely,can correct errors that act on up to t physical qubits at unknown sites.There are also approximate QECC which we do not focus on in this paper.

    2.2.Quantum circuit model

    There are a few universal quantum computing models [41]and here we employ the quantum circuit model(QCM)in our study.In the setting of QCM,universality means that any unitary operator U ∈SU(2n) can be efficiently approximated byto an arbitrary accuracy ∈.The circuit size ofshall be polynomial of log

    In QCM,a unitary U is realized as a sequence of gates that are available,and an algorithm is realized by acting U on an input state,followed by a measurement process for readout.A gate is a unitary operation that can be turned on and off by external control.A set of gates is called a universal gate set if the product of gates from it can approximate any unitary efficiently.The two well-known examples are the set {H,T,CX} and the set {H,CCX} for

    and CCX as the Toffoli gate CCX=P0?1+P1?CX,CX usually denoted as CNOT,and X,Z as Pauli matrices,P0,1=The Toffoli gate is known to be universal for classical computation.We do not need to consider nonunitary gates since,due to the dilation theorem,any nonunitary quantum channel can be realized by a unitary operator,together with final measurements on ancilla.When QEC rounds are required,they can also be realized by unitary operations followed by measurements.

    In quantum circuits,quantum gates are causally ordered in the sense that the space and time location of a gate is classical and controlled by a classical computer or system.Also the direction of time,namely,the information flow,of a circuit is fixed,which is from the given input to the desired output.This agrees with the intuition from classical algorithms,which can be generalized for the quantum case (see section 3).

    Figure 3.Quantum algorithm and special cases (from left to right,top to bottom):classical one by permutation Π from bits to bits(e.g.a bit-string i to j),quantum one by unitary U from bits|i〉to bits|j〉or a nontrivial entangled state|ψ〉,and with the final bit values read out by measurement.This also applies to quantum meta-algorithms,i.e.combs.The classical circuit-design algorithm is not shown here,see figure 4.

    Quantum algorithms can be described relative to a universal computing model,such as adiabatic algorithms and quantum walks,but they can be translated into the circuit model.A quantum algorithm,Q,is usually described by a quantum circuit,together with a proper initial state and readout scheme.The readout contains the solution S to a given problem,P,which is the input of a classical circuitdesign algorithm,A.Namely,A:P ?[Q]for[Q]as a classical description of the quantum algorithm Q:|0〉?S,with S as measurement outcome and |0〉 as an initial state required by Q.See figures 3 and 4.This framework applies to many quantum algorithms,including quantum phase estimation,quantum simulation,etc [1].The classical algorithm A is an essential part and often difficult to find,and it could be limited if [Q]cannot be efficiently described.

    The solution to a problem is encoded in the expectation value

    of observableO on the final state ρf.The measurement scheme ofO is required to be efficient.This usually requires running many rounds of the circuit to estimate the observable.Sometimes the output is just the final state ρfwithout a measurement,which can be subsequently given into another quantum algorithm,yet eventually,measurement is required to convert quantum states into classical values.Quantum algorithms are generically probabilistic,namely,within a given accuracy ∈,the approximate solution ofis obtained with a high probability p that can be efficiently boosted towards 1.We emphasize here that a quantum algorithm is a generalization of a probabilistic algorithm,or in other words,it unifies classical and probabilistic ones.The output of the quantum algorithm is of the formtr(Oρf),which needs both quantum state generation and quantum measurement.

    Figure 4.Structures of quantum algorithms.The basic structure(topleft) has a classical algorithm A that designs the quantum algorithm Q,or labelled by the unitary circuit U.It extends to the iterative classical-quantum algorithms (top-right),which can be ‘stretched’into a linear flow (bottom),and the most general forms in terms of quantum combs,see figure 8.

    2.3.Quantum no-go theorems

    Although quantum information is an extension of the classical case,there are significant differences that are apparently revealed by various so-called no-go theorems.The goal of this section is to show that a few fundamental no-go theorems are equivalent,and the underlying physics is the uncertainty principle.

    The no-cloning theorem [14,15]is well known and it states that an unknown quantum state cannot be cloned by any quantum operations,e.g.from|ψ〉to|ψ〉|ψ〉.In general,it applies to n→m cloning process

    for m >n,U and |χ〉 are independent from the input |ψ〉.It would violate the linearity of quantum operations.It was shown to be equivalent to a quantum estimation problem[19],namely,a perfect quantum cloning machine will estimate an unknown state perfectly,and a perfect quantum estimation machine will also yield many copies of an unknown state.The quantum estimation task can be realized by a unitary operation with

    for |[ψ]〉 as a bit-string encoding of |ψ〉 or the estimated parameters in it.The states|[ψ]〉are orthogonal for any pair of input states.For pure states,the set of states that can be perfectly cloned or estimated are orthogonal with each other.

    The no-programming theorem [9]is also due to orthogonality.If there is a quantum operation U that realizes

    for any data state|d〉and any program state|PG〉that encodes the unitary operator G serving as a program,then the set of programmable states {|PG〉} have to be orthogonal.Orthogonality implies classicality since an orthogonal set of states can be viewed as a basis of a Hilbert space.Any superposition of basis states is not programmable.Note that the output is product states.The no-programming has also been extended to POVM [20]and the physics is similar.

    It is easy to see its relation with the cloning and estimation task.If |PG〉 can be cloned or estimated perfectly,it would lead to a perfect universal programming machine.On the contrary,the state ∣PG′〉is independent of |d〉 so it can be recycled [31]to recover |PG〉,which would lead to the execution of G an arbitrary number of times,which is a cloning of G or state G|d〉.

    Furthermore,it is well understood that quantum estimation can be done probabilistically or approximately,and a probabilistic scheme can also be treated as an approximate scheme if the outcomes are mixed together.In quantum metrology,it has been established that an arbitrary parameter held by a quantum state or evolution can only be estimated approximately,and the error is lowered bounded due to the uncertainty principle and also the extension of it via quantum Fisher information [50].Although there are many variants of the uncertainty principle based on different operations,the essential fact it established from the Cauchy—Schwarz inequality

    for|x,y〉from an inner-product space is that the uncertainty of two non-commuting operators on a quantum system is lower bounded by the degree of their non-commutativeness.Optimal schemes for universal quantum cloning,estimation,and programming are known [29,31,51,52],and the common fact is that,given n copies of the unknown parameter,state,or gate,the accuracy is no better than the scaling 1/n2,which is achievable using multipartite entangled states.Without entanglement,the accuracy bound reduces to the so-called short-noise limit 1/n.The accuracy cannot be exponential(e.g.2-n) as that would converge to the perfect case,hence violating the no-go theorems.

    There is also a no-go theorem in the setting of QECC[23],which states that the transversal logical gates on a finitedimensional quantum error-detection code form a finite group.We can see the connection with the above no-go theorems from the error-detection condition and output state form.An encoding operation can be defined by a unitary operator U:|?〉→|ψ?〉that maps logical states ∣?〉 ∈HLto the encoded states∣ψ?〉 ∈HP.For a transversal partition HP=?nHn,any transversal unitary operator takes the form

    Now suppose the states|ψ?〉are product states ?n|ψn〉instead of being entangled.If the error-detection condition is required,then all 1-local states are fixed,which is then impossible to encode logical states |?〉.If the states |ψ?〉 are product states,while the error-detection is only for classical errors,e.g.for bit-flip errors on any site but not for phase-flip errors,then we find orthogonal logical states are mapped to orthogonal 1-local states for all sites.Here we notice the orthogonality and this actually leads to classical error-detection codes.Now if we allow entangled states |ψ?〉,the errordetection will require the set of transversal logical gates to be a finite group.This is a feature that is not present in other nogo theorems we mentioned above.If the error-detection condition is dropped,then SU(2n)-covariant codes exist[32–39]which apparently allow any transversal logical gates.However,the accuracy of such codes is limited by the uncertainty principle,and for n transversal parts,the accuracy is upper bounded by 1/n2[36,37].Indeed,the encoding operation can be viewed as an estimation scheme of |?〉,and the transversal operations are the parallel black-box calls.The optimal entangled resource states for estimation are also found to be optimal for SU(2n)-covariant codes [38].

    Another notable no-go theorem is the no-control over unknown quantum operations [10,11],which forbids the process

    for fixed unitary U1,2,3acting on the tri-partite system,and any unknown U acting on the third subsystem,and CU as the controlled-U on the second and third subsystems,up to an arbitrary global phase on U.It turns out it is of a different category from the three no-go theorems above.It not only violates the linearity of quantum operations,but also the meaningless of global phases of quantum states or operations.The above process would lead to the perfect distinction between a gate U and-U,which is impossible in quantum theory.This has been shown as a topological obstruction from the Borsuk–Ulam theorem [12],and there is no approximate version of the no-control theorem.It also forbids the process|ψ1〉|ψ2〉?|ψ1〉⊕|ψ2〉 since it maps global phases of one state to relative phases between the two states.In general,this is a ‘no-packing’ of unknown quantum operators,and such packings are not valid operations on Hilbert spaces.

    It turns out there is an easy scheme to overcome the nocontrol theorem [10–13],which is to know at least one eigenstate of the gate U.Given the black-box access of U,the CU can be realized as

    for a as an ancilla and 1aas the completely-mixed state of it,CSWAP as the controlled-SWAP gate,and the input state for the target of CU is the known eigenstate of U.In addition,another case is when the gate CU itself is given with U unknown,which applies to situations that U has trivial action on a few levels or modes that belongs to the whole Hilbert space[13].These levels or modes are eigenstates of CU with eigenvalues 1.

    3.Ingredients

    3.1.Stored quantum programs and data

    Stored programs and data are important components of the von Neumann architecture of computers.Despite the noprogramming theorem,here we present an efficient scheme of stored quantum programs and data,based on the recent study[40],and this is the starting point for our model of QCS.The quantum memory unit in QCS contains many programs and data,each of which are prepared with many copies made and stored with definite addresses in the memory unit.The query of quantum memory and computation with them is efficiently controlled by the quantum control unit.For simplicity,we focus on the unitary evolution of pure states,which can be quite straightforwardly extended to the non-unitary evolution of mixed states.

    For a pure state ∣ψ〉 ∈H,a simple scheme is just to prepare |ψ〉 and store it as quantum data.While here we introduce a different scheme that will be employed in our model.We define its computational preparation circuit as U with |ψ〉=U|0〉,for |0〉 as a computational basis state ofH.The U is not unique but can always be chosen properly.We define quantum data of |ψ〉 as the Choi state |ωU〉 of its preparation circuit U.For an n-qubit state,it needs 2n qubits to store it as quantum data.In general,this storage can be made arbitrarily accurate if the accuracy of |ω〉 and U can be guaranteed.On the contrary,we can store a state |ψ〉 directly as classical data,denoted as [ψ].For generic n-qubit states,this is to convert all the amplitudes ψi=〈i|ψ〉into bits,which cannot be efficient with respect to n.Only special types of states such as stabilizer states[53]can be described efficiently using bit strings on classical computers.

    A quantum program or algorithm is defined by a unitary operator,while often also requiring special initial states as input and special measurements as a readout scheme.For simplicity,we treat the input as a part of data,and readout as a separate stage.Namely,a quantum program merely refers to a unitary operator U.Similar to quantum data,a stored quantum program |ωU〉 is the Choi state of U.

    From the relation (4),the action U|ψ〉can be realized by the measurement of|ψ〉on site B of|ωU〉[40].Define a binary projective measurement {P0,P1} with

    for P0tas the transpose of P0,and the measurement outcomes 0 and 1 are recorded.When the outcome is 0,the state on site A is U|ψ〉.When the outcome is 1,the state on site A is1-U|ψ〉〈ψ|U?.This is enough for the readout of the computational resulttr(Oρf),which is encoded as an observableO on site A,for ρf=U|ψ〉〈ψ|U?and the valuetr (O) is efficiently computable as required by the readout scheme (see section 3.3 for more discussions).

    When the input |ψ〉 is stored as the quantum data of its preparation circuit,we need the composition of Choi states.Given two Choi states∣ωU1〉and∣ωU2〉,the symmetry-based quantum gate teleportation [40]leads to the state∣ωU2U1〉orin a heralded way.Namely,a qubit ancilla is used to encode the outcomes of Bell measurement being trivial (with no byproduct) and non-trivial (with Pauli byproducts),recorded by 0 and 1.The case of being 0 requires no further action but only teleports U2t,while the case of being 1 can teleport U2but need a correction rotation U2;adjas the adjoint representation of U2.As a unitary matrix can be decomposed as a product of two symmetric unitary matrices,a program can be stored by two Choi states and the composition

    will avoid the transpose (of U2) and becomes deterministic.In this work,we name the symmetry-based quantum gate teleportation as an SU(d)-covariant or universal quantum teleportation (UQT) since it can teleport any unitary gate,which eventually guarantees the universality of our storedprogram scheme.The UQT serves as the composition operations and is denoted by a rounded box in the circuit,see figure 2 (or by distinguished wires in figure 7 or circles in figure 10).

    We see that after the execution,the quantum program is destroyed,i.e.overwritten by trivial bits.Even with many copies of a quantum program,it can only be used for a finite amount of runs.This seems to be a drawback of quantum data,but it turns out to be the opposite.Quantum programs are secure and expensive,which stand as key distinctions from classical programs and memory,which can be perfectly cloned and reused forever,if no encryption or subscription is required (also see section 4).After a quantum program is executed and overwritten by trivial bits,it shall be restored by downloading it.

    A program shall not only be stored in memory,but also shall be downloadable from the internet.Although the internet is an extra object of a computer system,here we present a scheme to download quantum programs from an anticipated quantum internet [54].The downloading operation for the classical case contains the cloning of classical data and overwriting some amount of bits in the memory.For the quantum case,this cannot be done since quantum data cannot be cloned.Quantum programs are provided by quantum software vendors,who wish to keep the programs unknown to the agent.The quantum internet requires the communication of qubits.However,Holevo’s bound asserts that a qubit can communicate at most a single bit [55],consistent with the uncertainty principle and the no-cloning theorem.For a quantum program U,flying qubits such as photons can be prepared as the entangled state|ωU〉itself in principle,but the agent cannot use them to recover the quantum program U efficiently in its quantum memory.

    Fortunately,quantum cryptography [28]shows that bits can be securely communicated using qubits.Meanwhile,a quantum program U can be described by its classical information efficiently,if it is given as a sequence of gates composing a quantum circuit,∏?U?.Namely,given a universal gate set,the type of each gate(e.g.H,T,CX)can be encoded by two bits.The space-time location of an elementary gate can be encoded by bits efficiently.Therefore,the classical information of U contains the bits for the types and spacetime locations of the gates.For a circuit that is efficient with respect to the number n of qubits and accuracy ∈,the bit-string description of the gate sequence of U is efficient.Note that although it can be used to construct U,yet as a single matrix,U cannot be stored efficiently by bits in general.The bit-string description of U can be encrypted by a quantum software vendor,and securely communicated using qubits (or even using the post-quantum encryption [56]).After receiving the bit-string description,the agent,which is a quantum computer and is protected by encryption,can apply the gate sequence to restore the quantum program.The quantum program remains unknown to the agent,hence the program is securely downloaded and the quantum program is secure.In all,we demonstrated the viability of stored quantum programs,and we also remark that practical security is far more complicated than the primary scheme we presented here.

    Figure 5.Schematics of a tailed quantum circuit.The shaded box is a unitary operator.The curved wires contain the tails,which are arranged on the left side for the input.The multiple-controlled NOT gate (i.e.an n-fold Toffoli gate) is for the initial-state injection.The dotted gray wire is an example of a contraction on a head-tail pair.

    3.2.Tailed quantum circuits

    In accord with the stored quantum programs,we need to introduce a modification of the standard quantum circuit model,termed as tailed quantum circuit model.Recall that a quantum program |ωU〉 is a bipartite state,and we name the subsystem acted upon by U as ‘head’,and the other as ‘tail’.A tailed quantum circuit is a quantum circuit U of a sequence of quantum gates that act on a few qubits and the heads of a few ebits,while each tail is left unchanged.Without qubit input,a tailed quantum circuit is just a program state |ωU〉.The input for a program is injected into the circuit by making measurements on a few tails.The readout is specified by quantum measurement and supported on a few heads.The input is always carried by tails,output is carried by heads.See figure 5 for an example.

    Due to ebits,we can apply some novel operations with tailed quantum circuits.Given a collection of elementarytailed quantum circuits,they can be connected in series and parallel to form larger programs.The elementary tailed quantum circuits are those for elementary gates from universal gate sets.Familiar gates are Pauli gates X,Y,Z,and H,T,CZ,CX,CCX,CCZ,etc.We focus on H,T,and CZ as examples,see figures 6 and 7 for an example with simplified notations.They are all symmetric matrices,so they can act on either the upper or the bottom wire,but as a convention,we choose the upper one as the head.Using the UQT defined in section 3.1,smaller tailed circuits can be composed into larger ones,just as the composition of gates in a usual quantum circuit.

    A large program U ∈SU(d) can be stored with a ‘bold’high-dimensional tail of dimension d,or with a qubit tail for each qubit in the system when d is converted to 2nfor a number n.When there are multiple tails and heads,contraction(or fusion)of a pair can be made by a Bell measurement on them.A pair can be of any form,head-head,tail-tail,or head-tail.Cares are needed to properly choose the time flow after the input and output measurements are being made to avoid backward flow in time or closed time loops.The application of the contraction will be further discussed in section 6.

    Figure 6.The elementary quantum gates H,T,and CZ (left),their Choi states (middle),and simplified notations (right).

    Figure 7.An example of a quantum circuit realized by composition of elementary quantum programs for H,T,and CZ stored in the quantum memory.The compositions are denoted by gray wires.

    As quantum measurement outcome is random,a tailed quantum circuit can be employed to sample a collection of circuits.For each ebit,a measurement of Pauli Z on its tail injects either state|0〉or|1〉with equal probability,or in other words,a Pauli X byproduct that cannot be corrected.For the contraction of a pair of head and tail,the Bell measurement yields a connected wire but with Pauli byproduct X,Y,or Z that cannot be corrected either.The measurement outcomes are recorded so can be used to sample circuits with different initial states and final measurements.However,this also means that an initial state,e.g.a computational state=∣0 0 … 0〉,cannot be prepared deterministically.This is indeed true since a qubit state cannot be obtained deterministically from an ebit.To execute an algorithm on a tailed quantum circuit,we need a different input-injection scheme which is studied in the next subsection.

    3.3.Algorithmic universality

    Here we define a so-called algorithmic universality relative to tailed quantum circuits and show how to run quantum algorithms with tailed quantum circuits.Basically,it needs initialization,unitary evolution,and the readout measurement.The unitary operation is given as the program state.Suppose the input is required to be∣→〉,which is easier to illustrate than∣→〉.We define a binary measurement P={P0,P1} with P0=1-P1andP1=A qubit ancilla initialized at|0〉is needed to realize it.For n qubit tails,a n-fold Toffoli gate[57]is needed to copy the AND of all qubit values to the ancilla (see figure 5).The Z measurement on the ancilla realizes P:0 for P0,and 1 for P1.The n-fold Toffoli gate can be decomposed into a product of a polynomial number of elementary gates.In particular,it can be decomposed as a cascade of n-1 Toffoli gates with n-1 qubit ancilla.Furthermore,it is easy to see the probability for P1is 2-n,which is tiny.In other words,most of the time P0is realized.In this case,the output isof′ :=tr (O)-〈ψf∣O∣ψf〉f→orof=〈ψf∣O∣ψf〉as the true desired output,with∣ψf〉=The value ofof′ can be estimated by running the algorithm multiple times,as usually to be the case for quantum algorithms.Given thattr (O) is easy to compute,thenof=tr (O)-of′is obtained with high probability.

    The above demonstrates that any quantum algorithm that can be realized on a usual quantum circuit can also be realized on a tailed quantum circuit.This proves the universality of the tailed quantum circuit model,which we term here as an algorithmic universality since it is defined in the setting of quantum algorithms.In passing,probably a better term could be observational universality since it is due to the ability to compute observable values or a weak universality based on the weak operator topology on a Hilbert space [58].Furthermore,the algorithmic universality is actually more complete than the usual notion of universality,which does not take account of the cost of readout explicitly.For instance,some readout schemes cannot be done efficiently (with respect to ∈),such as the estimation of unknown gates [29]and an approximate stored-program scheme [31],which actually reduce the universality to a quasi universality [35].The algorithmic universality guarantees the universality of a model to realize quantum algorithms.

    The study above also extends to more general quantum algorithms.Just as quantum combs are able to describe general quantum operations,it is natural to see that they also describe more general types of quantum algorithms [41].A quantum comb takes a set of quantum objects {Qn} as input but uses quantum operations to change them into a desired output,with a quantum adversary as a resource.This forms a quantum meta-algorithm that designs a quantum algorithm by another quantum algorithm (the comb).The input {Qn} can be given as unitary oracles or known as black boxes.If they are given as stored programs{∣ωQn〉},we can use the composition scheme to connect them and form a comb.That is to say,we can implement a quantum comb using a stored-program scheme,see figure 8.Each unitary operator in the comb can be decomposed as a product of two,then an input object Qnsurrounded by two unitary operators is a block for a superchannel.Now for each∣ωQn〉we first apply a superchannelon it,and then we apply the composition of them in sequence to form the comb.In addition,the classicalquantum hybrid algorithms (see figure 4),which feed measurement results from Q to A,can be viewed as a special case of classical combs with the sequence of Qs as its input and the measurements and A as the comb.

    Figure 8.A quantum comb (bottom) and its realization by the composition on Choi states(top).The information flows towards the right for the circuit of a comb,while flows upwards for the composition.

    3.4.Quantum control unit

    The control unit (CU) is an important component of a computer system.In general,it interacts with all other components of a computer system,but usually,it does not carry the final solution to the given problems.It controls or monitors the procedure and progress of information processing during computation.For instance,it needs to guarantee that instructions from any algorithm are executed in the right order.Also,it needs to guarantee that data and programs are read and written at the right place in the memory.Besides universality,there is also a feature of modularity such that CU and CPU are independent components of a computer system.Here,we lay out the basic principle to design a quantum control unit(QCU),without going into details of the so-called control bus and data bus[47].We find there are freedoms that can be explored for its design.

    We first analyze the idea of control and quantum control from the viewpoint of algorithms.A control scheme is a procedure that aims to achieve a goal by applying a set of control items on a system.It can be understood algorithmically,but with different goals and costs from algorithms.Quantum control often uses a set of quantum operators to control a scheme to achieve an operational goal [59].The control operators may be supported by the target system itself,or not.It is straightforward to see that a general quantum control can be described as a quantum comb,with the adversary as the control.The controller becomes entangled with the target system in general,but it shall not contain final solutions.For instance,a common task in quantum control is to use external fields to control the states of atoms or electrons,which is often semi-classical since there is no entanglement between the fields and the systems.There are also controls with feedback.The simplest example is the CNOT gate,which is an entangling gate.In terms of Pauli operators,the target Pauli is also copied to the control qubit.Another example is using measurement on the target,and the outcome is fed back to the control,and this basically behaves as an iterative algorithm.

    Figure 9.The schematics to show the role of quantum control in a computation.

    In our model,the QCU is qubits and their interactions with other components.This includes the control of the composition of programs,the initial-state injection measurement,and readout measurement,see figure 9.We find there is a freedom to choose for the nature of the control.The minimal type is classical,namely,any quantum algorithm can be monitored classically.The classical control does not carry quantum information.On the other hand,the control can be as quantum as possible,and this is described as quantum combs.As a result,the control scheme could be an inevitable part of a quantum algorithm,and the design of quantum algorithms would involve a significant part of the controller.Actually,some quantum algorithms can be understood in this way,such as the quantum switch [60]and the linear combination of unitary operations [61,62].

    Furthermore,whenever the controller participates in the computation in a nontrivial way,the corresponding comb can be stored as a set of programs again.Then another level of control is required to realize this comb by composition.This eventually reduces the control to classical ones.Such a reduction of the control sequences or levels is similar to phenomena in other topics,such as algorithms and quantum measurements.For algorithms,we can always add a prealgorithm that designs the algorithm,no matter whether it is classical or quantum.For quantum measurement,there requires a cut to tell how a special value of an observable is obtained from a set of possible values,as originally studied by von Neumman [24].

    Therefore,we require a minimal or basic set of functions of a QCU.We shall make the QCU modular so it can be used for all quantum targets easily.The basic operation is the quantum control of a quantum operation,which is harder than classical control of a quantum operation,but easier than general entangling quantum operations.As the study of the no-control over unknown quantum operations in section 2.3 reveals that,an unknown quantum operation as a grey box can be controlled by qubits.Using qubits as control is a resource that can be explored,just as the quantum algorithms mentioned above demonstrated.With bits,each run of a quantum algorithm is a unitary U applying on a fixed initial state|ψi〉and a fixed readout of.With qubits,there could be a superposition of quantum algorithms by applying different compositions and measurements conditioned on the control qubits,i.e.different unitary,initial states,and readout can be realized in parallel and interfere.

    4.Features

    Our model of QCS requires both qubits and ebits (i.e.Bell states),Bell measurement and its generalization,and both unitary evolution and measurement play vital roles.The input does not have to be fixed at the beginning.The readout scheme avoids the problem in the setting of the no-programming theorem,which requires input as a separate state and the output is a state instead of measurement outcomes.A nontrivial POVM readout can be simulated by a unitary and a simple projective measurement from the dilation theorem.Quantum control in general requires multiple-controlled gates,which can be decomposed into elementary gates but that complicates the control process.The usage of ebits as quantum memory signifies the distinction between quantum information and classical information.It is protected by the uncertainty principle.Below we discuss our model in more detail to reveal its relations with other computing models or schemes,and its overall features,requirements,and limitations.

    First,we clarify the notion of a computer system.The universal computing model mainly refers to the framework to process information,while a computer system mainly refers to the architecture to divide and combine various aspects of information processing.A quantum computer system is a particular quantum system that is designed for computing tasks.Together with our formulation of universality,we emphasize the difference between quantum computing and a usual quantum evolution that occurs in nature every day.Quantum computing is usually formulated just as instrumentalists do: prepare an initial state,let it evolve,and then observe via measurement.This is an analog description.Instead,our study shows that quantum computing is more and needs to be almost fully digital.The states need to be encoded as qubits,programs encoded as ebits,and the final solution ofis carried by an observable,which can in principle be converted to bit strings such as using a quantum amplitude estimation algorithm [63].

    As has been mentioned,the current QCS is a quantum–classical hybrid,known as a quantum random-access machine[64],which contains both classical and quantum registers.The quantum data on the quantum registers would not be entangled with the control or program.In the original sense [6–8],our model of QCS is also not fully quantum,despite the usage of quantum control and quantum programs.For instance,we do not need a halt qubit to signal the end of a computation.Instead,a computation or an algorithm ends with measurements.Actually,the vital thing is not whether it is fully quantum or not;instead,it shall be its computational power and physical flexibility,such as being local and modular.As we have discussed for the quantum control,we can always shift the boundary between the quantum and classical parts.Also,we currently do not require the ability of the quantum query of all quantum data in superposition,like that in the scheme [65]for a quantum random-access memory.

    The QPU in our model is described by the quantum circuit model,which can be replaced by other universal models,such as quantum Turing machine and quantum cellular automata,which are the quantum versions of their classical analogs [41].Meanwhile,if we view the composition as a whole,it prepares matrix-product states or tensor-network states,which are universal forms of quantum states [66–68].This is linked with a local model of the quantum Turing machine[69]which prepares matrix-product states assisted by a quantum adversary.But here it is the quantum adversary (or edge) that carries the logical information.

    Our model can be viewed as an extension of quantum communication and cryptography by the universal computation on ebits and Choi states,besides qubits.The computation with Choi states introduces input by measurements,and mainly concerns the final expectation value ofof observable as output.If the input is treated as an initial state and carried by a separate system from the program,one has to use a highly entangled optimal program state,e.g.a generalized Choi state and global covariant measurement for the retrieval operation[29,31,51],which is constrained by the uncertainty principle.That is to say,our stored programs are protected by the uncertainty principle,namely,if an Eve or virus tries to obtain a stored program,a global measurement on many copies of it has to be applied with limited accuracy.

    Our model can also be seen as an extension of measurement-based quantum computing (MBQC) [70].In MBQC,the resource state does not contain the program;instead,the program is the measurement base.Each measurement is one-local and it is based on the U(1)symmetry of teleportation[71].The measurements are adaptive in order to avoid the byproduct of teleportation.The original universal blind quantum computing [72]is based on MBQC,which achieves blindness or security via pbits to hide measurement bases.The security relies on the computational difficulty of searching for the right program over a large set of possible ones.In fusion-based quantum computing [73],Bell measurements are used to grow graph states or stabilizer states,but there is no stored quantum programs.In our setting,we use two-local covariant measurements as an extension of Bell measurements,which do not contain the programs;instead,the programs are ‘pre-stored’ as quantum states.Our model has a close connection with valence-bond solids (VBS) [66](see section 6 for more details).As a result,we establish our model of QCS to be digital,universal,modular,and quantumsecure,and can also be made fault-tolerant.

    5.Fault tolerance

    In this section,we show how the QCS is consistent with the requirement of fault tolerance.The quantum fault-tolerance or threshold theorem states that universal quantum computation on logical qubits can be realized if the physical error rate for each logical qubit is below a threshold that is determined by the QEC[1].The QEC itself could also be noisy,whose effect is to reduce the threshold value.Physical gates to realize logical ones may also be imperfect,which are treated as perfect ones followed by noises.The fault tolerance is implicitly required by universality since between any two logical gates,U and V,QEC is needed to ensure the identity gate1 to formU1V.For a QCS,it also needs to replace qubits with logical qubits for all its components,including the memory,control,gates,measurements,etc.We find that the main issue is the fault tolerance of the composition operations.

    For the quantum memory,an ebit is replaced by a logical ebit,which can be efficiently prepared.If a code is defined by an isometry V,the logical ebit can be obtained as

    for |ω〉 as the encoded ebit.A logical stored program state|ωU〉Lis obtained by applying a logical gate U on |ω〉L.For a code[[n,k,d]],logical gates U commute with its projector P,[U,P]=0.For different codes,the form of U varies significantly.The composition of two logical program states|ωU〉Land |ωV〉Lis done by the logical version of the composition scheme,which is a UQT on 2n physical qubits.A qubit ancilla is needed for a composition,which in principle can use a different code.

    In the composition scheme,logical gates need to be symmetric to avoid the transposition of gates.This is a nontrivial requirement on logical gates.We find a concise scheme that satisfies the requirement.First,notice that the tensor product of symmetric gates is still symmetric.So it is easy to teleport transversal logical gates that are symmetric.It turns out the elementary gates are all symmetric such as logical H,T,and CZ.Then we can use the scheme of code switching[74]to combine the transversal logical gates from different codes.For instance,if there are two codes C1and C2that can be fault-tolerantly switched into each other by measuring their stabilizers,then their transversal logical gates can be combined together,even achieving universality[75].Then we can apply code switching and composition on them to form large programs.

    For composition,a gate Uadj∈SO(N2-1) for N=2nis needed to teleport a logical gate U.Such gates Uadjcan be efficiently done.However,they are not logical gates in general for the given codes.Actually,a sequence of compositions can be viewed as a code concatenation procedure,with the given codes as the inner codes,and the outer code being an SU(N) VBS edge code [35].Now the fault-tolerance of the composition is the fault-tolerance of the concatenation procedure,and this is also a common issue when just preparing a code.For a code defined by an encoding isometry V,there could be noises during the encoding itself.It could be hard to do QEC before the code is prepared,and the threshold theorem implicitly assumes that this can be done.For codes that the code projector P is composed of a product of smaller projectors P=∏nPn,e.g.for stabilizer codes [53]and codes defined by frustration-free Hamiltonians,each projector Pnis prepared gradually,hence can be used for QEC during the encoding or concatenation.

    Despite the similarity,there is also an important difference between the composition and code concatenation.In order to run a quantum algorithm,the VBS outer code does not have to be prepared firsthand.Instead,we can do an initial-state injection first,and then composite the first logical gate,then the second logical gate,and so on.The VBS outer code only appears in the time direction.Actually,this is similar to MBQC [70]and it reduces the idler time and QEC cost.To ensure fault tolerance,QEC is performed on the inner codes before and after the teleportation of each logical gate.Therefore,the fault tolerance is mainly determined by the inner codes for logical qubits and ebits.

    More generally,logical gates can be of higher depths.Ideally,we shall employ codes with some non-transversal high-depth logical gates as symmetric matrices,which currently we do not know of.This is left as an interesting task for the future.Nevertheless,there is a method to enforce fault tolerance by adapting the QEC dynamically during the time period of logical gates to account for the effects of the gate on the code.The issue is also encountered for the braiding of non-Abelian anyons[76].Suppose a logical gate UL=∏iUiis a sequence of symmetric non-logical gates Ui(note all elementary gates and their tensor products are symmetric).Each Uionly affects a code C locally,and it defines a new code Ci,which is stored separately.QEC can be performed for each Ci.When the gate sequence Uiis applied one after another,it induces a sequence of codes C[i],which is for gates U[i]=Ui…U2U1.The support of U[i]will be maximal in the middle of UL,and QEC becomes challenging but can be performed in principle.

    6.Extensions

    Before we conclude,we present a few direct extensions of our model.These are based on the key features or elements in our model,e.g.the usage of ebits,composition,and contraction operations.The extensions here can be used in our model,in principle,while their properties and applications remain intriguing.They could also be of independent interest for other tasks such as quantum simulation,quantum communication,and quantum error-correction codes.

    As for the circuit model,a quantum circuit can be imprinted on a geometric structure such as graphs or regular lattices.This also applies to the composition of programs,which can be extended from the one-dimensional flow to high-dimensional or structured flows.For instance,we showed that two qubit-gates are connected in parallel through a CZ gate,which requires the SU(2)-covariant gate teleportation.This can be extended to the SU(4)-covariant case by treating CZ and qubit gates on an equal footing.It can lead to interesting tensor-network states,also known as PEPS.See figure 10 for an example.Other Lie groups can also be used for the composition by treating the wires as representations.If the program states are arranged regularly,it can yield states with SPT orders[77].A special class of states is valence-bond solids [66]which have global Lie-group symmetry and weak SPT order.Indeed,if we start from empty program states,i.e.ebits,and use the projectors onto certain representations,this yields valence-bond solids,which,in this setting,shall be viewed as a herald of our composition network.It has been well established that valence-bond solids can be used for MBQC [78],with a program served by a sequence of measurement bases,which is classical.On the contrary,in our scheme here the program is quantum and has been pre-stored in the ebits,as we have discussed in section 4.

    Figure 10.An example of a portion of a high-dimensional composition of quantum programs.The big circles are SU(4)compositions,the small circles are SU(2) compositions.We have stretched the wires for H and T programs to be lines.The inclined bold segments are CZ gates.

    Figure 11.An example of a higher-order quantum circuit.The boxes are unitary gates.The dimension of each wire could be different.

    A generalization of the tailed quantum circuits is to use higher-order quantum operations [42–44],which is based on an iterative usage of the channel-state duality.For instance,a superchannel can also be converted into a Choi state and then acted upon by a channel of one higher order.They can all be properly represented by unitary quantum circuits.See figure 11 for an example.Recall that a channel is a 1-comb.One central difference between nth-order operations and ncombs is that the dimension of the former likely grows exponentially faster than the latter.That is,it is much harder to climb up the hierarchy by increasing the order than by adding more input channels to a comb.Despite this,higherorder quantum operations lead to interesting circuits with concatenated or nested structures,with each unitary being a‘nest.’ Nests on different levels of the hierarchy can be composed together leading to higher-order quantum combs.These nested circuits involve nonlocal gates acting on many wires and may be used to describe novel quantum dynamics.

    Using local gates and also the contraction operation,we introduce another type of circuit,called topological quantum circuits,as an extension of the tailed quantum circuits.Intuitively,an ebit together with a contraction forms a closed loop.A tailed quantum circuit with many tails and many contractions can be viewed as a complex of loops.These loops are linked or knotted together due to their interactions,i.e.quantum gates.From knot theory [79],a knot or link is formed by vertices (or crossings) and lines connecting them.A vertex contains a top wire and a bottom wire.Now we map a vertex to a type of circuit with two tails and two heads,together with possible qubit wires,and the gate in the circuit is not fixed.As a convention,we assign the top (bottom)wires as tails (heads).A segment between two vertices is mapped to a contraction.We can see primary examples in figure 12,while more complicated topological quantum circuits can also be constructed following the roles.Without additional qubits,each diagram is an overlap between a product of Choi states and a product of Bell states.If there are un-contracted qubits,a topological circuit,in general,prepares a multi-qubit entangled state,without direct interactions among the qubits.These entangled states are not appearing in the form of matrix-product states,and their properties are worth separate investigations.

    Figure 12.Primary examples of topological quantum circuits.From left to right,top to bottom: a circle,its circuit,and a circuit for two separate circles;a link,the circuit for a vertex,and the circuit for the link;a knot,and the circuit for the knot.The boxes are unitary gates.The dashed lines are contractions.Additional qubit wires for each box are not shown explicitly.

    7.Discussion and conclusion

    In this work,we present a primary model of a universal quantum computer system.Our study extends the current formation of quantum–classical hybrid computer systems,and it shows that there are proper quantum advantages for information storage,processing,protection,etc.In the meantime,a modern computer system is far more complicated than the original von Neumann architecture,and this provides challenging opportunities for further development of quantum computer systems.

    Our study highlights the role of the uncertainty principle,revealing the fundamental difference between classical and quantum information.The nature of quantum information is intriguing [80,81].Our model indicates that ebits (i.e.Bell states) are the elements for memory,while qubits are the elements for computation.On the contrary,classical bits are the elements for both classical computation and memory,while pbits are only used for computation.It also appears that ebits are the analog of bits,which is an echo of the fact that quantum teleportation is the analog of the one-time pad [82].Yet Bell states are entangled and nonlocal,which is not the case for bits.Furthermore,qubits are combinations of bits and pbits,and somehow are analog signals since the amplitudes in superposition are carried by qubits instead of being digitized into bit strings.In the so-called classical regime,the uncertainty principle also applies to the Fourier transform,which is often used to analyze signals.For the dynamics,we know that quantum computing generalizes permutation and stochastic operations to unitary operations followed by quantum measurements.However,there is no need to convert qubits or pbits into bits,and simulate unitary or stochastic operations by permutations.Quantum computing is still digital in the sense that any task can be decomposed into elementary gates and projective measurements acting on qubits and ebits.

    A key feature of our model is that the stored quantum programs are consumed after a computation.In order for the computer system to be reusable,the programs have to be restored by downloading from the internet,if renewing the hardware of the quantum memory were not advisable.Actually,the internet and communication network have become an indispensable part of the modern computing network.Therefore,an extension of our model is to include a quantum internet toward distributed quantum computing[54].A major merit of distributed computing is that it distributes or breaks a computational task into communication among several parts,each with fewer requirements on its computational power.As a whole,it can also be viewed as a restricted QCS,e.g.direct operations on two QCS are not available.This can be described by the local quantum Turing machine model [69],which has a close connection with matrix-product states and tensor-network states.This points to a viable connection between tensor-network states and quantum communication.

    We mentioned that we do not study QCS from the perspective of hardware,which requests various physical and engineering tasks.For instance,the quantum memory in our model is a collection of quantum states.In the sense of hardware,quantum memory refers to a hardware or device that can store quantum states,more precisely,store the quantum systems that carry quantum information.Devices for input and output are diverse and also require sophisticated information processing techniques,but in our study,they are basically bit strings generated by quantum measurements.QCS requires the understanding of physical problems including,but not limited to,dissipation,efficiency,energy cost,the role of fundamental laws,mechanism of almost all devices,etc.More broadly,like a giant artificial quantum system,QCS is a subject to reveal the interplay between quantum physics and modern technologies based on control,system,and information theory.

    Acknowledgments

    This work has been supported by the National Natural Science Foundation of China (Grant No.12 047 503 &No.12 105 343).Previous conversations with I Affleck,P Hayden,R Laflamme,H Nautrup,T Shi,Y Wang,J Watrous,Y Wu,Y Yang,S Yi,and G Zhu are acknowledged.

    欧美日韩亚洲综合一区二区三区_| 一区二区三区国产精品乱码| 国产精品美女特级片免费视频播放器 | www.精华液| 一夜夜www| 亚洲精品美女久久久久99蜜臀| 久久狼人影院| 午夜免费成人在线视频| 日韩精品青青久久久久久| 精品福利观看| 欧美乱色亚洲激情| 久久热在线av| 成人18禁高潮啪啪吃奶动态图| 免费在线观看成人毛片| 国产精品免费视频内射| 欧美色欧美亚洲另类二区| 国产av一区二区精品久久| 精品国产国语对白av| 欧美日韩福利视频一区二区| 国产精品久久久人人做人人爽| 一级a爱视频在线免费观看| 久久久久精品国产欧美久久久| 在线观看日韩欧美| av视频在线观看入口| 99精品欧美一区二区三区四区| www.自偷自拍.com| 老熟妇仑乱视频hdxx| 精品一区二区三区视频在线观看免费| 老司机在亚洲福利影院| 超碰成人久久| 好看av亚洲va欧美ⅴa在| 又黄又粗又硬又大视频| 国产精品一区二区免费欧美| 高清在线国产一区| 高清在线国产一区| 欧美大码av| 欧美日韩亚洲国产一区二区在线观看| 国产精品亚洲av一区麻豆| 美女 人体艺术 gogo| 日韩有码中文字幕| 久久这里只有精品19| 亚洲成国产人片在线观看| 久久草成人影院| 久久久久久亚洲精品国产蜜桃av| 国内精品久久久久久久电影| 99久久国产精品久久久| 欧美成狂野欧美在线观看| 国产精品久久久久久人妻精品电影| 欧美日韩乱码在线| cao死你这个sao货| 午夜亚洲福利在线播放| ponron亚洲| 亚洲一区二区三区不卡视频| 一区二区三区国产精品乱码| 国产成人精品久久二区二区免费| 人人妻人人看人人澡| 人妻久久中文字幕网| 桃色一区二区三区在线观看| 在线观看免费午夜福利视频| 18禁黄网站禁片午夜丰满| 亚洲一码二码三码区别大吗| 国内毛片毛片毛片毛片毛片| 日本免费a在线| а√天堂www在线а√下载| 欧美成人性av电影在线观看| av视频在线观看入口| 免费女性裸体啪啪无遮挡网站| 亚洲一码二码三码区别大吗| 啪啪无遮挡十八禁网站| 国产高清有码在线观看视频 | 国产亚洲av高清不卡| 婷婷亚洲欧美| 99国产精品一区二区三区| 国产免费男女视频| 搞女人的毛片| 中文字幕精品免费在线观看视频| 无限看片的www在线观看| 看黄色毛片网站| 99国产精品一区二区三区| 欧美国产精品va在线观看不卡| 老熟妇乱子伦视频在线观看| 黄色 视频免费看| 欧美+亚洲+日韩+国产| 韩国精品一区二区三区| 久久久久久九九精品二区国产 | 色婷婷久久久亚洲欧美| 亚洲一区中文字幕在线| 欧美绝顶高潮抽搐喷水| 成人永久免费在线观看视频| 欧美 亚洲 国产 日韩一| 国产人伦9x9x在线观看| 久久久久国产一级毛片高清牌| 亚洲第一欧美日韩一区二区三区| 少妇的丰满在线观看| 精品久久久久久成人av| 日韩欧美在线二视频| 亚洲欧洲精品一区二区精品久久久| 黄色a级毛片大全视频| 真人做人爱边吃奶动态| 亚洲 欧美一区二区三区| netflix在线观看网站| 国产精品国产高清国产av| 亚洲精品在线美女| 精品电影一区二区在线| 日韩成人在线观看一区二区三区| 波多野结衣av一区二区av| 午夜免费观看网址| 国产欧美日韩精品亚洲av| 久久中文字幕人妻熟女| 18禁裸乳无遮挡免费网站照片 | 亚洲免费av在线视频| 成年女人毛片免费观看观看9| 高清在线国产一区| 国产激情偷乱视频一区二区| 欧美绝顶高潮抽搐喷水| 午夜激情av网站| 日本成人三级电影网站| 午夜视频精品福利| 久久国产乱子伦精品免费另类| 免费电影在线观看免费观看| 在线天堂中文资源库| 听说在线观看完整版免费高清| 久久亚洲真实| 99在线视频只有这里精品首页| 国产日本99.免费观看| 国产精品久久电影中文字幕| 久久午夜综合久久蜜桃| 国产99久久九九免费精品| 中文资源天堂在线| 国产精品免费视频内射| 伊人久久大香线蕉亚洲五| 一a级毛片在线观看| 国产成年人精品一区二区| 中文字幕另类日韩欧美亚洲嫩草| 亚洲欧美一区二区三区黑人| 1024手机看黄色片| 亚洲一区高清亚洲精品| 久久久久精品国产欧美久久久| 亚洲av中文字字幕乱码综合 | 嫩草影院精品99| 欧美zozozo另类| av福利片在线| 久久精品国产99精品国产亚洲性色| xxx96com| 岛国在线观看网站| 日韩欧美 国产精品| 搡老岳熟女国产| 18禁国产床啪视频网站| 久久久国产精品麻豆| 国产欧美日韩精品亚洲av| 91麻豆av在线| av福利片在线| 成人18禁高潮啪啪吃奶动态图| 啦啦啦韩国在线观看视频| 两性夫妻黄色片| 日本免费a在线| cao死你这个sao货| 在线观看日韩欧美| 欧美日韩亚洲国产一区二区在线观看| 啦啦啦韩国在线观看视频| 婷婷精品国产亚洲av| 国产一区二区三区视频了| 丁香欧美五月| 欧美黄色片欧美黄色片| 国产亚洲欧美在线一区二区| 中文字幕另类日韩欧美亚洲嫩草| 久久精品影院6| 宅男免费午夜| 亚洲成av片中文字幕在线观看| 国产精品精品国产色婷婷| 免费看十八禁软件| 久久香蕉激情| 久久草成人影院| 一级毛片女人18水好多| 99久久99久久久精品蜜桃| 成人av一区二区三区在线看| 99re在线观看精品视频| 国产亚洲欧美在线一区二区| 欧美激情高清一区二区三区| 成年人黄色毛片网站| 欧美日韩亚洲国产一区二区在线观看| 欧美最黄视频在线播放免费| 亚洲自偷自拍图片 自拍| 久久久久久人人人人人| 久久99热这里只有精品18| 免费观看人在逋| 在线观看免费日韩欧美大片| 国产成人一区二区三区免费视频网站| 欧美另类亚洲清纯唯美| 亚洲国产日韩欧美精品在线观看 | 午夜视频精品福利| 精品国产美女av久久久久小说| 国产精品九九99| 一夜夜www| 亚洲人成电影免费在线| 99久久综合精品五月天人人| 精品久久久久久久人妻蜜臀av| 国产亚洲精品久久久久久毛片| 婷婷精品国产亚洲av在线| 日韩欧美一区二区三区在线观看| 国产一区二区三区在线臀色熟女| 又大又爽又粗| 精品一区二区三区四区五区乱码| 亚洲欧洲精品一区二区精品久久久| 在线观看舔阴道视频| 亚洲三区欧美一区| 一区福利在线观看| 国内毛片毛片毛片毛片毛片| 男人的好看免费观看在线视频 | 人人妻人人澡人人看| 九色国产91popny在线| 国产精品一区二区精品视频观看| 日本成人三级电影网站| 婷婷精品国产亚洲av在线| 深夜精品福利| 午夜福利在线观看吧| 首页视频小说图片口味搜索| 亚洲 欧美一区二区三区| 亚洲三区欧美一区| 亚洲国产看品久久| 亚洲中文av在线| 亚洲精华国产精华精| 非洲黑人性xxxx精品又粗又长| 成人18禁高潮啪啪吃奶动态图| 成人永久免费在线观看视频| 欧美日韩黄片免| 欧美黑人精品巨大| 听说在线观看完整版免费高清| 午夜福利在线观看吧| 夜夜夜夜夜久久久久| 怎么达到女性高潮| 无限看片的www在线观看| 12—13女人毛片做爰片一| 少妇被粗大的猛进出69影院| 免费高清视频大片| 日韩高清综合在线| 午夜久久久在线观看| 精品国产乱子伦一区二区三区| 夜夜看夜夜爽夜夜摸| 欧美黑人精品巨大| 两个人视频免费观看高清| 黄色片一级片一级黄色片| 看片在线看免费视频| 999精品在线视频| 深夜精品福利| 午夜福利在线观看吧| 精品日产1卡2卡| 搡老熟女国产l中国老女人| 国产黄片美女视频| 精品人妻1区二区| 国产三级黄色录像| 在线观看免费日韩欧美大片| 久久久久国产一级毛片高清牌| 午夜日韩欧美国产| 免费在线观看影片大全网站| 久久精品夜夜夜夜夜久久蜜豆 | 一区二区三区激情视频| 国产男靠女视频免费网站| 亚洲熟妇中文字幕五十中出| 免费看美女性在线毛片视频| 亚洲欧美激情综合另类| 国产精品野战在线观看| 免费在线观看影片大全网站| 欧美激情 高清一区二区三区| 免费看美女性在线毛片视频| 久久久精品国产亚洲av高清涩受| 国内精品久久久久精免费| 亚洲一区中文字幕在线| 成人三级黄色视频| 国产伦人伦偷精品视频| 久久久精品国产亚洲av高清涩受| 亚洲人成网站高清观看| 国产99白浆流出| 午夜免费观看网址| 久久九九热精品免费| 欧洲精品卡2卡3卡4卡5卡区| 亚洲最大成人中文| 最好的美女福利视频网| 日韩视频一区二区在线观看| 国产国语露脸激情在线看| 国产又黄又爽又无遮挡在线| 变态另类成人亚洲欧美熟女| 美女免费视频网站| 亚洲人成77777在线视频| 午夜老司机福利片| 黄色毛片三级朝国网站| 国产一区二区三区视频了| 黄片小视频在线播放| 久久久久国内视频| 国产精品 欧美亚洲| 免费无遮挡裸体视频| 在线视频色国产色| 国产一级毛片七仙女欲春2 | 亚洲一码二码三码区别大吗| 色综合欧美亚洲国产小说| 黑人操中国人逼视频| 精品电影一区二区在线| 淫秽高清视频在线观看| 午夜激情福利司机影院| 国产精品亚洲av一区麻豆| 成人欧美大片| 老熟妇仑乱视频hdxx| 成人亚洲精品一区在线观看| 亚洲成人久久爱视频| 久久青草综合色| 久久久久久免费高清国产稀缺| 波多野结衣高清作品| 老司机午夜十八禁免费视频| 国产精品亚洲美女久久久| 一进一出抽搐gif免费好疼| 变态另类成人亚洲欧美熟女| 亚洲国产精品999在线| 亚洲无线在线观看| 91国产中文字幕| 国产激情偷乱视频一区二区| 午夜两性在线视频| 久久久水蜜桃国产精品网| 久99久视频精品免费| 精品第一国产精品| 夜夜看夜夜爽夜夜摸| 国产成年人精品一区二区| 免费搜索国产男女视频| 精品久久久久久久末码| 婷婷丁香在线五月| 一卡2卡三卡四卡精品乱码亚洲| 欧美国产精品va在线观看不卡| 啦啦啦免费观看视频1| 国产伦人伦偷精品视频| 亚洲国产精品久久男人天堂| 日本黄色视频三级网站网址| 国产午夜精品久久久久久| 久久久精品国产亚洲av高清涩受| 岛国在线观看网站| 亚洲国产毛片av蜜桃av| 搡老妇女老女人老熟妇| 欧美色欧美亚洲另类二区| 免费在线观看视频国产中文字幕亚洲| av中文乱码字幕在线| videosex国产| 国产成人一区二区三区免费视频网站| 一级毛片高清免费大全| av天堂在线播放| 啪啪无遮挡十八禁网站| 国产aⅴ精品一区二区三区波| 欧美成人午夜精品| 国产91精品成人一区二区三区| 久久久久九九精品影院| 久久国产亚洲av麻豆专区| 国产三级在线视频| 亚洲av第一区精品v没综合| 国产97色在线日韩免费| 757午夜福利合集在线观看| 18禁国产床啪视频网站| 国产欧美日韩一区二区精品| 丁香六月欧美| 国产亚洲精品第一综合不卡| 69av精品久久久久久| 我的亚洲天堂| 午夜福利在线在线| 亚洲黑人精品在线| 亚洲 欧美一区二区三区| 欧美一区二区精品小视频在线| 欧美性猛交╳xxx乱大交人| 亚洲avbb在线观看| 麻豆成人av在线观看| 一二三四社区在线视频社区8| 久久这里只有精品19| 国产精品乱码一区二三区的特点| 在线永久观看黄色视频| 好男人在线观看高清免费视频 | 亚洲av成人av| 国内精品久久久久久久电影| 欧美日韩精品网址| 午夜a级毛片| 亚洲aⅴ乱码一区二区在线播放 | 看免费av毛片| 久久久久亚洲av毛片大全| 满18在线观看网站| 黄色丝袜av网址大全| 97碰自拍视频| 亚洲黑人精品在线| 高潮久久久久久久久久久不卡| 国产精品久久久久久亚洲av鲁大| av视频在线观看入口| 中文在线观看免费www的网站 | 国产野战对白在线观看| 欧美成人性av电影在线观看| 精品第一国产精品| 好男人电影高清在线观看| 欧美日韩乱码在线| 男女那种视频在线观看| 男人舔奶头视频| 性色av乱码一区二区三区2| 成人亚洲精品av一区二区| 侵犯人妻中文字幕一二三四区| 国产成年人精品一区二区| 无人区码免费观看不卡| 老司机深夜福利视频在线观看| 他把我摸到了高潮在线观看| 午夜老司机福利片| 日本成人三级电影网站| 琪琪午夜伦伦电影理论片6080| 日韩一卡2卡3卡4卡2021年| 欧美国产精品va在线观看不卡| 亚洲精品美女久久av网站| 国产成人欧美在线观看| 亚洲 欧美 日韩 在线 免费| 亚洲无线在线观看| 国产又黄又爽又无遮挡在线| 最好的美女福利视频网| 又大又爽又粗| 超碰成人久久| 国产一区二区在线av高清观看| 人妻久久中文字幕网| 亚洲专区中文字幕在线| 亚洲国产欧美一区二区综合| 色综合婷婷激情| 日韩欧美三级三区| 女人被狂操c到高潮| 亚洲成人久久性| 久久久久久久精品吃奶| 真人做人爱边吃奶动态| av在线播放免费不卡| 亚洲av熟女| 看免费av毛片| 国产精品久久久久久精品电影 | 国产一区二区三区视频了| 最近最新中文字幕大全免费视频| 日韩大尺度精品在线看网址| av在线播放免费不卡| 免费在线观看亚洲国产| 男人舔女人的私密视频| 香蕉av资源在线| 欧美丝袜亚洲另类 | 亚洲国产高清在线一区二区三 | 午夜老司机福利片| 亚洲五月色婷婷综合| 亚洲av电影在线进入| 国产aⅴ精品一区二区三区波| 日韩 欧美 亚洲 中文字幕| 中文字幕精品亚洲无线码一区 | 欧美激情 高清一区二区三区| www国产在线视频色| 免费在线观看影片大全网站| 满18在线观看网站| 精品卡一卡二卡四卡免费| 男女床上黄色一级片免费看| 法律面前人人平等表现在哪些方面| 99国产极品粉嫩在线观看| 午夜免费激情av| 国产精品国产高清国产av| 露出奶头的视频| 免费在线观看日本一区| 草草在线视频免费看| 可以在线观看的亚洲视频| 亚洲中文字幕日韩| 国产高清有码在线观看视频 | 中文字幕人妻熟女乱码| 免费在线观看视频国产中文字幕亚洲| 黄片小视频在线播放| 亚洲avbb在线观看| 韩国精品一区二区三区| 成人手机av| 亚洲五月色婷婷综合| 日本a在线网址| 久久久久免费精品人妻一区二区 | 别揉我奶头~嗯~啊~动态视频| 国产乱人伦免费视频| 国产黄色小视频在线观看| 看免费av毛片| 免费在线观看完整版高清| 成人18禁在线播放| 搡老岳熟女国产| 人人妻人人澡人人看| 欧美日韩黄片免| 又大又爽又粗| 老司机在亚洲福利影院| 久久中文字幕一级| 99国产精品99久久久久| 日韩欧美三级三区| 国产av一区在线观看免费| 97人妻精品一区二区三区麻豆 | 真人做人爱边吃奶动态| 国产精品二区激情视频| 一本精品99久久精品77| 久久人人精品亚洲av| bbb黄色大片| 国产99白浆流出| 十八禁人妻一区二区| 老司机在亚洲福利影院| 亚洲欧美一区二区三区黑人| 91在线观看av| 亚洲精品国产精品久久久不卡| 国内久久婷婷六月综合欲色啪| 国产在线观看jvid| 国产日本99.免费观看| 波多野结衣高清无吗| 国产精品美女特级片免费视频播放器 | 国产一级毛片七仙女欲春2 | 日本熟妇午夜| 国产精品九九99| 窝窝影院91人妻| 男女床上黄色一级片免费看| 亚洲天堂国产精品一区在线| 亚洲第一av免费看| 欧美黄色淫秽网站| 亚洲精品在线观看二区| 18禁黄网站禁片午夜丰满| 999精品在线视频| 国产亚洲av嫩草精品影院| 亚洲中文字幕日韩| 这个男人来自地球电影免费观看| 亚洲av五月六月丁香网| 成人午夜高清在线视频 | 欧美日韩乱码在线| 久久精品国产综合久久久| 精品久久久久久久毛片微露脸| 我的亚洲天堂| www.999成人在线观看| 精品久久久久久久久久免费视频| 亚洲,欧美精品.| 亚洲欧洲精品一区二区精品久久久| 婷婷六月久久综合丁香| 黄色丝袜av网址大全| 1024香蕉在线观看| 色尼玛亚洲综合影院| 久久精品国产亚洲av香蕉五月| xxxwww97欧美| 亚洲自拍偷在线| 精品久久蜜臀av无| 无遮挡黄片免费观看| 在线av久久热| 国产精品久久久av美女十八| 欧美成人免费av一区二区三区| 久久国产精品男人的天堂亚洲| 91麻豆av在线| 巨乳人妻的诱惑在线观看| 特大巨黑吊av在线直播 | 亚洲成国产人片在线观看| 国产亚洲精品第一综合不卡| 99久久精品国产亚洲精品| 日韩精品青青久久久久久| 久久这里只有精品19| 99国产极品粉嫩在线观看| 日韩有码中文字幕| 亚洲 国产 在线| 美女 人体艺术 gogo| av中文乱码字幕在线| 非洲黑人性xxxx精品又粗又长| 免费看a级黄色片| 久久久久国产一级毛片高清牌| 99re在线观看精品视频| 亚洲avbb在线观看| 久久精品aⅴ一区二区三区四区| 亚洲国产精品久久男人天堂| 婷婷六月久久综合丁香| 午夜久久久久精精品| 国产精品二区激情视频| 国产99久久九九免费精品| www.999成人在线观看| 脱女人内裤的视频| 色综合站精品国产| 国产亚洲精品一区二区www| 两个人视频免费观看高清| 国产乱人伦免费视频| 久久精品91无色码中文字幕| 99国产精品一区二区三区| 岛国视频午夜一区免费看| 国产99久久九九免费精品| 色综合站精品国产| 国产伦一二天堂av在线观看| 黄频高清免费视频| 白带黄色成豆腐渣| 久久久久久九九精品二区国产 | cao死你这个sao货| 757午夜福利合集在线观看| 啪啪无遮挡十八禁网站| 熟女电影av网| 久久精品91无色码中文字幕| 亚洲 欧美 日韩 在线 免费| 青草久久国产| 老熟妇仑乱视频hdxx| 在线看三级毛片| 97人妻精品一区二区三区麻豆 | 国语自产精品视频在线第100页| 欧美成人一区二区免费高清观看 | 亚洲一区高清亚洲精品| 久久狼人影院| 中文字幕最新亚洲高清| 精品国产美女av久久久久小说| 国内精品久久久久精免费| 欧美日韩中文字幕国产精品一区二区三区| 在线播放国产精品三级| 色综合亚洲欧美另类图片| 50天的宝宝边吃奶边哭怎么回事| 亚洲精品美女久久久久99蜜臀| 亚洲av中文字字幕乱码综合 | 热re99久久国产66热| 国产黄色小视频在线观看| 国产精品99久久99久久久不卡| 国产色视频综合| 国产精品久久久久久亚洲av鲁大| 免费看日本二区| 男人舔女人下体高潮全视频| 精品久久久久久久久久久久久 | 久9热在线精品视频| 亚洲全国av大片| 国产成人欧美在线观看| 草草在线视频免费看| 国产在线精品亚洲第一网站| 久久久久久大精品| 精品国产国语对白av| 性色av乱码一区二区三区2| 一级a爱视频在线免费观看| 麻豆av在线久日|