Skip to main content
Philosophical transactions. Series A, Mathematical, physical, and engineering sciences logoLink to Philosophical transactions. Series A, Mathematical, physical, and engineering sciences
. 2017 Oct 2;375(2106):20160394. doi: 10.1098/rsta.2016.0394

Path-sum solution of the Weyl quantum walk in 3 + 1 dimensions

G M D'Ariano 1, N Mosco 1, P Perinotti 1,, A Tosini 1
PMCID: PMC5628258  PMID: 28971946

Abstract

We consider the Weyl quantum walk in 3+1 dimensions, that is a discrete-time walk describing a particle with two internal degrees of freedom moving on a Cayley graph of the group Inline graphic, which in an appropriate regime evolves according to Weyl's equation. The Weyl quantum walk was recently derived as the unique unitary evolution on a Cayley graph of Inline graphic that is homogeneous and isotropic. The general solution of the quantum walk evolution is provided here in the position representation, by the analytical expression of the propagator, i.e. transition amplitude from a node of the graph to another node in a finite number of steps. The quantum nature of the walk manifests itself in the interference of the paths on the graph joining the given nodes. The solution is based on the binary encoding of the admissible paths on the graph and on the semigroup structure of the walk transition matrices.

This article is part of the themed issue ‘Second quantum revolution: foundational questions’.

Keywords: quantum walks, path-sum, path-integral, quantum field theory, discrete time

1. Introduction

Quantum walks (QWs) were originally introduced as the quantum analogue of classical random walks or Markov chains [1]. A discrete-time QW [24] describes a quantum particle jumping on a graph in discrete time steps, the ‘direction’ of the jumping being conditioned on the internal state of the particle. The latter is represented in a finite-dimensional Hilbert space—the coin space—while the Hilbert space associated with the positions on the lattice is generally infinite dimensional. The total Hilbert space of the walk is the tensor product of the above ones.

Since their first appearance, QWs have received an increasing attention in the literature, where their main application is the design of quantum algorithms [58]. As an example, efficient search algorithms [6,9,10] were devised exploiting the fact that the spread of a localized initial state after t steps is proportional to t, whereas for the classical random walk the spread is proportional to Inline graphic. Remarkably, any quantum circuit can be implemented as a QW on a graph, proving that QWs can be used for universal quantum computation [11].

Recently, in [12], the authors use QWs in a derivation of quantum field theory from principles, from which it follows that the graph of the QW is the Cayley graph of a finitely presented group G. The QWs reproducing free quantum field theory in Euclidean space correspond to group Inline graphic that is Abelian, which is the most common case in the literature. In particular, the simplest QW descending from the principles is the Weyl QW [12], reproducing the Weyl quantum field theory. The QW approach to quantum field theory has been successfully used in [1220], where non-interacting field theories are studied in a simplified picture in terms of QWs.

In §2, we review the definition of QWs on Cayley graphs. In §3, we introduce the Weyl QW and solve its path-sum on the body-centred cubic (BCC), three-dimensional lattice.

2. Path-sum approach for quantum walks on Cayley graphs

In this section, we review the notion of a QW, focusing on the underlying graph structure, which for QWs representing a homogeneous dynamics is the Cayley graph of some group.

(a). Quantum walks on Cayley graphs

Every group can be described in terms of a set of generators. For example, the group Sn of permutations of n objects {1,2,…,n} is generated by transpositions Tij, namely those permutations that exchange the elements i and j and leave every other element untouched. Every permutation in Sn can be decomposed as a finite sequence of transpositions.

If the generators are viewed as an alphabet, each word over the alphabet is associated with an element of the group, and vice versa; given an element of the group, we can always find a word over the alphabet expressing the group element. To set the terminology, following [21], we define an alphabet as any non-empty set Σ, and a word over the alphabet Σ as a map w: {1,2,…,n}→Σ, for some non-negative integer n. The length of a word w: {1,2,…,n}→Σ is |w|:=l(w):=n, and for n=0 there is a unique word denoted ε, called the empty word for the alphabet Σ. The set of finite strings over Σ, denoted by Σ, is equipped with the associative operation of string concatenation, with ε as its unit.

We now come back to the idea of treating a set of generators of a group as an alphabet and make it more rigorous. We first introduce the set S−1 of formal inverses of S, and we say that a word over S is a word over the alphabet SS−1. When we consider a word over S, it may happen that the word contains, for example, the substring xx−1 for xS. In this case, clearly, xx−1 can be substituted by the empty string ε, thus shortening the length of the word by two, and the group element expressed by the shorter word is the same as the one expressed by the initial one. A word is called reduced if it does not contain substrings of the form xx−1, with x in SS−1, i.e. it cannot be shortened further by the simplification rule above. The set of all reduced words F(S) can be given a group structure where the group operation is represented by word juxtaposition, the unit is ε, and the inverse of a word w is the word consisting of the inverses of the symbols of w juxtaposed in the reverse order. The group F(S) is called the free group over the alphabet S.

However, the free group F(S) might be larger than the group that we are willing to present. For example, for the Abelian group Inline graphic, one can choose two generators S={a,b}. In this case, the two reduced words aabb and abab denote the same group element. In order to complete the presentation of the group, one then has to specify, besides the trivial simplification xx−1ε, a minimal set of rules that allow one to identify words expressing the same group element. These rules come as a set R of words that amount to the group identity e.

Any group G has then a presentation 〈S|R〉—S being a set of generators and R a subset of F(S), whose elements are called relators. The group G with presentation 〈S|R〉 is the group isomorphic to F(S)/〈RF(S)〉, where 〈RF(S)〉 denotes the normal closure1 of R in F(S). Knowing a presentation 〈S|R〉 of a group, we can give a graphical representation of it, called a Cayley graph, capturing both its algebraic and geometric properties. We have the following definition.

Definition 2.1 (Cayley graph) —

Let G be a group and let 〈S|R〉 be a presentation of G. Then, the Cayley graph of G corresponding to the presentation 〈S|R〉, denoted Γ(G,S), is the coloured directed graph (G,E,{ch}hS) such that the vertex set is G, the edge set is E={(g,gh)|gG, hS} and each hS has an associated colour ch.

As an example, in figure 1, we show the Cayley graph of the dihedral group D4 on generators S={a,b}, with relators R={a2,b4,abab}.

Figure 1.

Figure 1.

The Cayley graph of the dihedral group D4=〈a,b|a2,b4,abab〉. The solid arrows represent b, while the dotted lines represent a. Note that a is represented without arrow heads because a=a−1.

We are interested in a discrete unitary evolution over such a graph. Formally, we have the following definition.

Definition 2.2 (quantum walk) —

Let V be a countable set, then a (discrete-time) QW on V is a local unitary operator W on the Hilbert space Inline graphic, namely a unitary operator W such that there exists Inline graphic and

graphic file with name rsta20160394-e1.jpg 2.1

where the neighbourhood Inline graphic of xV is defined as the set

graphic file with name rsta20160394-e2.jpg 2.2

and {|x〉}xV is the canonical orthonormal basis in ℓ2(V).

In this context, a QW on the set V can be specified providing the map Inline graphic associating with each pair of sites (x,y) a s×s-complex matrix, called transition matrix and representing the transition amplitude from x to y: in terms of the walk operator W, the map Inline graphic can be defined as Inline graphic. The unitarity requirement in terms of transition matrices amounts to

(a). 2.3

where Is denotes the identity on Inline graphic. The locality constraint, on the other hand, becomes

(a). 2.4

Furthermore, a sequence Inline graphic is a solution of the QW W if it satisfies the following update rule for a given initial condition Inline graphic:

(a). 2.5

where Inline graphic is defined in such a way that Inline graphic.

A QW W carries a natural graph structure defined by the non-null transition matrices, namely the directed graph (V,E) where V is the vertex set and E is the set of edges, Inline graphic. It has been shown [12] that the assumption of homogeneity of the QW W—i.e. the vertices cannot be distinguished by the walk dynamics—entails that the underlying graph is actually the Cayley graph Γ(G,S) of a group G. The group G acts on ℓ2(G) by means of the right-regular representation gTg as Tg|f〉:=|fg−1〉. The homogeneity condition also entails that the transition matrices are independent of the location: Inline graphic, ∀g,g′∈G and ∀hS, allowing the choice Inline graphic. Hence, the walk operator W can be written as

(a). 2.6

The scope of this paper is the study of the QW evolution in terms of a path-sum, recalling the Feynman formulation of quantum mechanics. Such an approach has been effective to obtain the exact analytic solution in position space in a number of cases [2225], giving a background for possible generalizations of the method on general graphs. In the present work, we will review the method in the setting of Cayley graphs and we will present a solution for the Weyl QW.

(b). Quantum walk evolution as a path-sum

Let us consider now a QW whose transition matrices are given by the map Inline graphic and whose associated graph is (V,E). From equation (2.5), one can readily write the evolution of a given initial configuration Inline graphic as a path-sum, which can be viewed as a discrete version of Feynman's path-integral [26,27]. The iteration of the one-step update rule (2.5) leads to an expression of the solution at time t in terms of the sum over all the paths σ of length t with fixed endpoints x′ and x, that is σ=(e1,e2,…,et), where ei:=(yi−1,yi) with the identifications y0x′ and ytx. We denote the set of all such paths as Λt(x′,x), and Inline graphic is the slice at time t of the past causal cone of x. In this way, the equation for the evolved state |ψx(t)〉 takes the form

(b). 2.7

The situation of main interest for us is when the underlying graph of the walk is actually a Cayley graph Γ(G,S). In such a case, the transition matrices depend only on the generators associated with the edges and, as before, we let Inline graphic. Note that a path σ is in Λt(x′,x) if and only if there exist h1,…,htS such that Inline graphic; therefore, we obtain the expression

(b). 2.8

where δ(x)=1 if x=ε and 0 otherwise, ε being the identity element of G, and Inline graphic. The aim of this work is to provide an analytical expression for the propagator of the walk

(b). 2.9

That is, we want to find an explicit expression for the transition amplitude from a site x to a site y in t time steps.

In the following section, we will present an application of the path-sum method in the specific case of the Weyl QW in 3+1 dimensions deriving the solution in position space with the aid of a binary encoding of paths, an approach which has already proven its efficacy in the case of the Dirac QW in 1+1 dimensions [24] and of the Weyl QW in 2+1 dimensions [25].

3. Weyl quantum walk in 3+1 dimensions

In the following, we will use the vector notation to denote points Inline graphic. The Weyl QW in 3+1 dimensions, derived by D’Ariano & Perinotti [12], is a QW on the BCC lattice Γ(G,S), where the vertex set can be chosen to be Inline graphic and the generators can be represented by the following vectors (and their inverses):

3. 3.1

The walk unitary operator is written as Inline graphic, acting on Inline graphic, and the transition matrices are

3. 3.2

with ζ=(1±i)/4 and hl=−hl. The two possible choices for the coefficient ζ correspond to the two inequivalent QW solutions existing on the BCC lattice [12].

The intent of this paper is to provide an explicit expression for the propagator given in terms of sums over paths. To this end, it turns out to be very effective to adopt a binary description of paths, which amounts to finding a three-bits binary encoding b1b2b3 for the generators. A suitable choice that simplifies the evaluation of the contribution to the transition amplitude of each path is given by

3. 3.3

This choice is tantamount to the requirement

3. 3.4

where ⊕ denotes the sum modulo 2 and Bb1b2 are the matrices

3. 3.5

satisfying the product rule given by

3. 3.6

where the notation ab denotes the binary product of the two bits a and b; throughout this paper, all the bit operations are also extended element-wise to binary strings. One can note from equation (3.6) that the matrices Inline graphic generate, up to phases, a finite semigroup. The general product of t transition matrices is then given by

3. 3.7

where Inline graphic is the string made of the jth bits of the encoding equation (3.3), Inline graphic being the set of all binary strings of length t. Here, wk denotes the kth bit of the string w. Finally, we introduced the function Inline graphic counting the number of 1-bits present in the string w and the left circular shift S defined by (Sw)i=w(i mod t)+1, for all i=1,…,t.

At this point, we need a characterization of the lattice paths in terms of their binary description. As shown in appendix A, the number of 1-bits in each one of the encoding strings Inline graphic is fixed by the starting point x′ and by the ending point x via the equations

3. 3.8

It is then convenient to define a special notation for the set of tuples of strings with a fixed number of 1-bits, which are indeed in bijective correspondence with paths connecting x′ to x in t steps:

3. 3.9
3. 3.10

assuming for short Inline graphic. Thus, the path-sum of equation (2.8) can be rewritten as

3. 3.11

where K1=(t+(x3x3))/2, K2=(t−(x1x1))/2 and K3=(t−(x2x2))/2 (note that the signs here are consistent with equation (2.8) where the matrix associated to the step h is exactly Ah−1). From equation (3.7), we see that the resulting matrix depends only on the first bit of w(1) and the last bit of w(2). Therefore, defining Inline graphic as the subset of triads (w(1),w(2),w(3)) with Inline graphic and Inline graphic, we can rewrite equation (3.11) as

3. 3.12

where the coefficients cab are defined by

3. 3.13

We seek now an explicit expression for the coefficients cab. As a first step, let us consider the sum Inline graphic alone with ι(w)=H for a given H and for some fixed Inline graphic. In order to compute this sum, we have to classify the strings lying in the set Inline graphic, according to the number of ones. It is convenient to define a canonical form for strings as follows.

Definition 3.1 —

We say that a binary string w is in canonical form if the following condition holds:

graphic file with name rsta20160394-e23.jpg 3.14

The computation of the coefficients cab in equation (3.13) is based on the next three results whose proofs are presented in appendix B.

Lemma 3.2 —

Given Inline graphic with K,Ht, let Inline graphic be in canonical form, then we have

graphic file with name rsta20160394-e24.jpg 3.15

and

graphic file with name rsta20160394-e25.jpg 3.16

with Inline graphic. Defining r=ϑ(KH), ϑ being the Heaviside step function, and Inline graphic the size of each subset is given by

graphic file with name rsta20160394-e26.jpg 3.17

and for all Inline graphic, the set-bit count is given by ι(w)=|KH|+2n.

Corollary 3.3 —

Given Inline graphic with K,H≤t, for all Inline graphic and for any πv bitwise permutation of Inline graphic such that πv(v) is in canonical form, the following decomposition holds:

graphic file with name rsta20160394-e27.jpg 3.18

with Inline graphic and moreover

graphic file with name rsta20160394-e28.jpg 3.19

Proposition 3.4 —

Given Inline graphic with K,Ht, for all Inline graphic we have that

graphic file with name rsta20160394-e29.jpg 3.20

where

graphic file with name rsta20160394-e30.jpg

with Inline graphic.

The expression of the coefficients cab of equation (3.13) can now be written as

3. 3.21

where, at this point, the sum is performed over the set Inline graphic. In order to ease the calculation, we can study separately the values of ι((w(1)Sw(1))⋅w(2)) and their interplay with f(K,H). The combinatorics for ι((w(1)Sw(1))⋅w(2)) is the same as that of [25] and is here reviewed for the convenience of the reader. The idea is to find a classification of the binary strings in terms of the values taken by ι((w(1)Sw(1))⋅w(2)). We first focus on the classification induced by w(1)Sw(1) and then, as the contributions to the result come only from the 1-bits of both w(1)Sw(1) and w(2), we use w(2) to select a given number of 1-bits from w(1)Sw(1).

The combinatorics induced by w(1)Sw(1) is provided by the following lemma (proved in appendix B).

Lemma 3.5 —

Let Inline graphic. Then, Inline graphic for some Inline graphic.

The above classification is not sufficient in our case, because the summation of equation (3.21) requires the strings w(1) and w(2) to have, respectively, the first and the last bit fixed. This means that we have to refine the counting taking into account such a constraint: we denote Inline graphic the set of strings Inline graphic such that Inline graphic with v1=a and vt=a′. The following lemma (also proved in appendix B) concludes the counting for strings with fixed endpoints.

Lemma 3.6 —

The number uaa(n) of binary strings Inline graphic is given by

graphic file with name rsta20160394-e32.jpg 3.22

with nmin(K)≤nnmax(K) and Inline graphic

graphic file with name rsta20160394-e33.jpg 3.23

Finally, we can focus on the joint classification given by the values of ι((vSv)⋅w) and of ι(vw). The final expression of the coefficients cab is summarized by the following proposition, whose proof is reported in appendix B.

Proposition 3.7 —

For t≥2, the coefficients of equation (3.21) take the form

graphic file with name rsta20160394-e34.jpg 3.24

where, defining r=ϑ(K1K2), we have that τJ=|K1K2|+2J, and

graphic file with name rsta20160394-e35.jpg 3.25

As a concluding remark of this section, we point out that, thanks to the binary encoding of paths, the counting is largely simplified, providing a powerful tool working in the general case.

4. Conclusion

In this paper, we provided an explicit analytical solution in position space of the propagator for the Weyl QW in 3+1 dimensions. The method used here to analytically compute the Weyl QW path-sum is grounded on

  • (i) a combinatorial analysis for the characterization of the admissible paths connecting two fixed sites of the graph in a given number of steps and

  • (ii) the semigroup structure of the walk transition matrixes.

The semigroup structure allows us to classify the admissible paths (or binary strings according to the first point) into equivalence classes according to the global transition matrix of the path. To aid the calculation, we adopted here an extremely powerful approach consisting of the translation of the geometric properties of lattice paths into algebraic properties of binary strings. Such binary description of paths was also successful in the case of the Dirac QW in 1+1 dimensions [24] and of the Weyl QW in 2+1 dimensions [25]. In all these cases, the practical computation of the propagator relies on the semigroup property of the transition matrices which allows one to determine all the paths contributing with the same matrix.

As a future perspective, we propose the possibility to investigate such semigroup property of the transition matrices in the general non-Abelian case. It would also be interesting to derive the general hypotheses in the framework of QWs on Cayley graphs for which the semigroup structure is recovered.

Appendix A. Relationship between lattice points and binary strings

The approach we follow here requires to find a binary description of paths: we provided such description by choosing a suitable binary encoding in equation (3.3) which also simplifies the evaluation of functions involving products of matrices giving the general formula of equation (3.7). Then, we also need to obtain a criterion telling us which paths have the same endpoints x′ and x; in order to do so, we employ the fact that the BCC lattice is Abelian: each path is described by a quadruple (n±1,n±2,n±3,n±4), where n±l counts the number of steps in direction h±l and thus each path must satisfy the system

graphic file with name rsta20160394-e36.jpg A 1

The binary encoding and the quadruple (n±1,n±2,n±3,n±4) are then related by the following constraints:

graphic file with name rsta20160394-e37.jpg A 2

where Inline graphic denotes the set-bit count of the string w. The relation we seek can be easily obtained by defining the number of steps in the positive- and negative-coordinate direction

graphic file with name rsta20160394-e38.jpg A 3
graphic file with name rsta20160394-e39.jpg A 4

ϑ being the Heaviside step function; then, for each i, it holds that

graphic file with name rsta20160394-e40.jpg A 5

Therefore, the set-bit counts of equation (A.2) are fixed by the coordinates through the equations

graphic file with name rsta20160394-e41.jpg A 6

Appendix B. Proofs of the results

Proof of lemma 3.2. —

Suppose for definiteness that KH. Given a string Inline graphic, we can define the two substrings (LKw)i=wi, for i=1,…,K, and (RKw)i=wK+i, for i=1,…,tK: we have that Inline graphic, Inline graphic and Inline graphic. Here for A and B sets of strings, the set AB is formed by concatenating the elements of A and B. Moreover, if nm, then Inline graphic, which entails that the products Inline graphic form a partition of Inline graphic, with Inline graphic:

graphic file with name rsta20160394-e42.jpg B 1

Thus, the set Inline graphic decomposes as

graphic file with name rsta20160394-e43.jpg B 2
graphic file with name rsta20160394-e44.jpg B 3
graphic file with name rsta20160394-e45.jpg B 4
graphic file with name rsta20160394-e46.jpg B 5

where in the third equation we have made use of the fact that v is in canonical form. The set-bit count of Inline graphic can be straightforwardly computed:

graphic file with name rsta20160394-e47.jpg B 6

Finally, one can easily obtain the size of each factor:

graphic file with name rsta20160394-e48.jpg B 7
graphic file with name rsta20160394-e49.jpg B 8
graphic file with name rsta20160394-e50.jpg B 9

The case K<H follows from a similar reasoning and we have the sought result. □

Proof of corollary 3.3. —

Let Inline graphic and let πv be a bitwise permutation such that πv(v) is canonical, then we have that

graphic file with name rsta20160394-e51.jpg B 10
graphic file with name rsta20160394-e52.jpg B 11

Therefore, using the decomposition of lemma 3.2, we can write

graphic file with name rsta20160394-e53.jpg B 12

 □

Proof of proposition 3.4. —

Suppose that KH and let Inline graphic, Inline graphic. From corollary 3.3, we know that Inline graphic, for some Inline graphic, and ι(vw)=KH+2n. Therefore, we can compute the sum of equation (3.20), obtaining finally the result:

graphic file with name rsta20160394-e54.jpg B 13
graphic file with name rsta20160394-e55.jpg B 14

 □

Proof of lemma 3.5. —

Let Inline graphic. From lemma 3.2 and corollary 3.3, we know that Inline graphic, for some Inline graphic. We can split the string πv(vSv)=:cπvSv as

graphic file with name rsta20160394-e56.jpg B 15

and

graphic file with name rsta20160394-e57.jpg B 16

Given that

graphic file with name rsta20160394-e58.jpg B 17

the set-bit count of cπvSv then reads

graphic file with name rsta20160394-e59.jpg B 18

Therefore, as ι(cπvSv)=2n, we have precisely

graphic file with name rsta20160394-e60.jpg

and the result follows. □

Proof of lemma 3.6. —

A string in Inline graphic can be constructed by first arranging the K 1-bits in n+aa′ slots and then by arranging the tK 0-bits in Inline graphic slots; the problem is then the same as counting the number of compositions of an integer [28]. We denote here as CK,n the number of n-compositions of an integer K:

graphic file with name rsta20160394-e61.jpg B 19

As the n+aa′ slots can be filled independently from the Inline graphic ones, the cardinality of Inline graphic is simply given by the product

graphic file with name rsta20160394-e62.jpg B 20

 □

Proof of proposition. —

Let us consider the case where K1K2 as the other one is a simple variation of the following construction. First of all, recall the expression for the coefficients (3.21), implementing the result of proposition 3.4:

graphic file with name rsta20160394-e63.jpg B 21
graphic file with name rsta20160394-e64.jpg B 22

where Inline graphic and Inline graphic. For ease of discussion, we consider from now on the case where a=a′=0, as the others can be treated in a very similar way.

We already know that the sum modulo 2 of a pair of strings 0vn0 and wb can be parametrized as ι(0vn0⊕wb)=|K1K2|+2J for some J; yet, we need to find a finer classification taking into account the values of ι((0vn0⊕vn00)⋅wb), for each fixed vn. To such end, we consider the partition

graphic file with name rsta20160394-e65.jpg B 23
graphic file with name rsta20160394-e66.jpg B 24

this particular construction corresponds to choosing as reference strings

graphic file with name rsta20160394-e67.jpg B 25

where the text under braces denotes the length of the substring.

As Inline graphic can be constructed by concatenating strings picked from the sets Inline graphic and Inline graphic, we can study separately the binary product and binary sum on them. Multiplying pL and pR with Inline graphic and Inline graphic, respectively, we obtain

graphic file with name rsta20160394-e68.jpg B 26
graphic file with name rsta20160394-e69.jpg B 27
graphic file with name rsta20160394-e70.jpg B 28

for all Inline graphic, whereas for the binary sum, we get

graphic file with name rsta20160394-e71.jpg B 29

In conclusion, the total number of ones for the sum modulo 2 turns out to be

graphic file with name rsta20160394-e72.jpg B 30

which corresponds to the parameter τJ of the statement of the proposition. Furthermore, as f(ι(0vn0⊕wb),K3) does not depend on k or k′, we can sum separately over the strings in equations (B 30) and (B 29) obtaining the function Inline graphic of equation (3.25):

graphic file with name rsta20160394-e73.jpg B 31

 □

Footnotes

1

The normal closure 〈RG〉 of a set R in a group G is the subgroup generated by gRg−1 with gG.

Data accessibility

This article has no additional data.

Authors' contributions

G.M.D. and P.P. conceived and designed the study. N.M. carried out the calculations. N.M. and A.T. drafted the manuscript. All the authors read, edited and approved the manuscript.

Competing interests

The authors declare that they have no competing interests.

Funding

This publication was made possible through the support of a grant from the John Templeton Foundation, no. 60609 ‘Quantum Causal Structures’.

Disclaimer

The opinions expressed in this publication are those of the authors and do not necessarily reflect the views of the John Templeton Foundation.

References

  • 1.Accardi L, Watson GS. 1989. Quantum random walks. In Quantum probability and applications IV (eds L Accardi, W von Waldenfels). Lecture Notes in Mathematics, vol. 1396, pp. 73–88. Berlin, Germany: Springer ( 10.1007/BFb0083545) [DOI]
  • 2.Grössing G, Zeilinger A. 1988. Quantum cellular automata. Complex Syst. 2, 197–208. [Google Scholar]
  • 3.Aharonov Y, Davidovich L, Zagury N. 1993. Quantum random walks. Phys. Rev. A 48, 1687–1690. ( 10.1103/PhysRevA.48.1687) [DOI] [PubMed] [Google Scholar]
  • 4.Aharonov D, Ambainis A, Kempe J, Vazirani U. 2001. Quantum walks on graphs. In Proc. 33rd Annual ACM Symp. on Theory of Computing—STOC ’01, Hersonissos, Greece, pp. 50–59. New York, NY: ACM Press ( 10.1145/380752.380758) [DOI]
  • 5.Ambainis A. 2007. Quantum walk algorithm for element distinctness. SIAM J. Comput. 37, 210–239. ( 10.1137/S0097539705447311) [DOI] [Google Scholar]
  • 6.Magniez F, Santha M, Szegedy M. 2007. Quantum algorithms for the triangle problem. SIAM J. Comput. 37, 413–424. ( 10.1137/050643684) [DOI] [Google Scholar]
  • 7.Farhi E, Goldstone J, Gutmann S. 2008. A quantum algorithm for the Hamiltonian NAND tree. Theory Comput. 4, 169–190. ( 10.4086/toc.2008.v004a008) [DOI] [Google Scholar]
  • 8.Childs AM, Cleve R, Deotto E, Farhi E, Gutmann S, Spielman DA. 2003. Exponential algorithmic speedup by a quantum walk. In Proc. 35th ACM Symp. on Theory of Computing—STOC ’03, San Diego, CA, USA, 9–11 June 2003, pp. 59–68. New York, NY: ACM Press ( 10.1145/780542.780552) [DOI]
  • 9.Santos RAM, Portugal R, Boettcher S. 2015. Moments of coinless quantum walks on lattices. Quantum Inform. Process. 14, 3179–3191. ( 10.1007/s11128-015-1042-9) [DOI] [Google Scholar]
  • 10.Wong TG. 2015. Grover search with lackadaisical quantum walks. J. Phys. A Math. Theor. 48, 435304 ( 10.1088/1751-8113/48/43/435304) [DOI] [Google Scholar]
  • 11.Childs AM. 2009. Universal computation by quantum walk. Phys. Rev. Lett. 102, 180501 ( 10.1103/PhysRevLett.102.180501) [DOI] [PubMed] [Google Scholar]
  • 12.D’Ariano GM, Perinotti P. 2014. Derivation of the Dirac equation from principles of information processing. Phys. Rev. A 90, 062106 ( 10.1103/PhysRevA.90.062106) [DOI] [Google Scholar]
  • 13.Arrighi P, Facchini S. 2013. Decoupled quantum walks, models of the Klein-Gordon and wave equations. Europhys. Lett. 104, 60004 ( 10.1209/0295-5075/104/60004) [DOI] [Google Scholar]
  • 14.Bisio A, D’Ariano GM, Tosini A. 2013. Dirac quantum cellular automaton in one dimension: Zitterbewegung and scattering from potential. Phys. Rev. A 88, 032301 ( 10.1103/PhysRevA.88.032301) [DOI] [Google Scholar]
  • 15.Arrighi P, Nesme V, Forets M. 2014. The Dirac equation as a quantum walk: higher dimensions, observational convergence. J. Phys. A Math. Theor. 47, 465302 ( 10.1088/1751-8113/47/46/465302) [DOI] [Google Scholar]
  • 16.Bisio A, D’Ariano GM, Perinotti P. 2016. Quantum cellular automaton theory of light Ann. Phys. 368, 177–190. ( 10.1016/j.aop.2016.02.009) [DOI] [Google Scholar]
  • 17.Bisio A, D’Ariano GM, Tosini A. 2015. Quantum field as a quantum cellular automaton: the Dirac free evolution in one dimension. Ann. Phys. 354, 244–264. ( 10.1016/j.aop.2014.12.016) [DOI] [Google Scholar]
  • 18.Bibeau-Delisle A, Bisio A, D’Ariano GM, Perinotti P, Tosini A. 2015. Doubly special relativity from quantum cellular automata. Europhys. Lett. 109, 50003 ( 10.1209/0295-5075/109/50003) [DOI] [Google Scholar]
  • 19.Bisio A, D’Ariano GM, Perinotti P, Tosini A. 2015. Weyl, Dirac and Maxwell quantum cellular automata. Found. Phys. 45, 1203–1221. ( 10.1007/s10701-015-9927-0) [DOI] [Google Scholar]
  • 20.Bisio A, D’Ariano GM, Perinotti P. 2016. Special relativity in a discrete quantum universe. Phys. Rev. A 94, 042120 ( 10.1103/PhysRevA.94.042120) [DOI] [Google Scholar]
  • 21.Epstein DBA, Paterson MS, Cannon JW, Holt DF, Levy SV, Thurston WP. 1992. Word processing in groups. Natick, MA: AK Peters, Ltd. [Google Scholar]
  • 22.Ambainis A, Bach E, Nayak A, Vishwanath A, Watrous J. 2001. One-dimensional quantum walks. In Proc. 33rd Annual ACM Symp. on Theory of Computing—STOC ’01, Hersonissos, Greece, pp. 37–49. New York, NY: ACM Press ( 10.1145/380752.380757) [DOI]
  • 23.Konno N. 2005. A path integral approach for disordered quantum walks in one dimension. Fluct. Noise Lett. 5, L529–L537. ( 10.1142/S0219477505002987) [DOI] [Google Scholar]
  • 24.D’Ariano GM, Mosco N, Perinotti P, Tosini A. 2014. Path-integral solution of the one-dimensional Dirac quantum cellular automaton. Phys. Lett. A 378, 3165–3168. ( 10.1016/j.physleta.2014.09.020) [DOI] [Google Scholar]
  • 25.D’Ariano GM, Mosco N, Perinotti P, Tosini A. 2015. Discrete Feynman propagator for the Weyl quantum walk in 2 + 1 dimensions. Europhys. Lett. 109, 40012 ( 10.1209/0295-5075/109/40012) [DOI] [Google Scholar]
  • 26.Feynman R. 1948. Space-time approach to non-relativistic quantum mechanics. Rev. Mod. Phys. 20, 367–387. ( 10.1103/RevModPhys.20.367) [DOI] [Google Scholar]
  • 27.Feynman RP, Hibbs AR, Styer DF. 1965. Quantum mechanics and path integrals. International Series in Pure and Applied Physics, no. 2 New York, NY: McGraw-Hill. [Google Scholar]
  • 28.Feller W. 2008. An introduction to probability theory and its applications, vol. 2 New York, NY: John Wiley & Sons. [Google Scholar]

Associated Data

This section collects any data citations, data availability statements, or supplementary materials included in this article.

Data Availability Statement

This article has no additional data.


Articles from Philosophical transactions. Series A, Mathematical, physical, and engineering sciences are provided here courtesy of The Royal Society

RESOURCES