Circuit Depth Thresholds for Logical Triviality in Quantum Error-Correcting Codes

Oksana Sudoma

ORCID: 0009-0009-8469-1382

November 26, 2025

Abstract

We establish a quantitative relationship between circuit depth and logical triviality in quantum error-correcting codes by combining two standard results. First, the Knill-Laflamme error correction conditions imply that operations supported on fewer than d/2 physical qubits act trivially on codes with distance d. Second, circuit depth bounds support growth: for depth-D circuits with k-local gates on a lattice with coordination number z (the maximum degree of any vertex: z=2 for 1D chains, z=4 for 2D square lattices, z=6 for 3D cubic lattices), the support satisfies 0+(k1)zD. Combining these yields an explicit circuit depth threshold:

D<d/20(k1)zU|codeId

The contribution is making this threshold explicit and operational. We demonstrate with the [[5,1,3]] perfect code and provide experimental verification protocols for ion trap and superconducting qubit platforms. The result provides a task-independent criterion for when circuit-based operations preserve encoded quantum information.

1 Introduction

Concrete Experience: The observer’s dilemma.

In quantum error correction, an observer with limited computational resources faces a fundamental constraint. Alice operates a quantum computer with 100 physical qubits encoding 10 logical qubits via a stabilizer code with distance d=7. She can perform single-qubit gates, two-qubit gates, and measurements. However, her circuit depth is bounded by available time and hardware constraints. A natural question arises: What operations can Alice implement on the logical qubits using only local physical operations?

If Alice applies a single-qubit rotation to one physical qubit, does this affect the logical state? What about a two-qubit gate? A three-qubit gate? Standard quantum error correction theory tells us codes with distance d can correct errors on fewer than d/2 qubits. But how does this translate into a bound on circuit depth?

From code distance to circuit depth bounds.

The distance d of a quantum error-correcting code measures the minimum weight of an operator that acts non-trivially on the logical subspace. Operations supported on fewer than d/2 physical sites cannot change the logical information—they act as the identity (up to a global phase) when restricted to the code subspace. This is the foundation of fault-tolerant quantum computation [GOT97, KL97].

We show this threshold translates directly into a circuit depth bound. If a depth-D circuit acts on a support small enough to remain below the distance threshold (<d/2), then the operation must be logically trivial. This provides a task-independent, falsifiable criterion for when locality is preserved.

Scope and limitations.

This paper proves a specific, limited result: the locality-distance relationship in quantum error correction implies a circuit depth threshold for logical triviality. We do not claim:

  • A general theory of “complexity-bounded locality” in physics

  • Applications to continuous systems (PDEs, gravity) without additional justification

  • Explicit constants beyond what standard QEC theory provides

Our contribution is making the QEC threshold explicit in terms of circuit parameters.

Potential holographic connections.

In holographic systems where the boundary theory may encode bulk physics via quantum error correction [ADH15, PYH+15], our result could provide operational criteria for bulk locality. This connection remains conjectured and requires further investigation (see Section 6.2). Our main contribution is the QEC circuit depth threshold; holographic applications are speculative extensions.

Comparison with Lieb-Robinson bounds.

Traditional Lieb-Robinson bounds [LR72] constrain information spreading under continuous Hamiltonian evolution: operators initially separated by distance r have commutators bounded by eμ(rvLRt). Our bound is fundamentally different: it constrains what operations an observer can implement using discrete gate circuits of bounded depth. The Lieb-Robinson bound applies to continuous dynamics; ours applies to discrete circuits. See Remark 1 for detailed comparison.

Structure of the paper.

Following Kolb’s learning cycle [KOL14], we progress from concrete scenarios (Introduction) to formal definitions (Section 2: Reflective Observation), to the main theorem (Section 3: Abstract Conceptualization), to worked examples (Section 4: Active Experimentation), and finally to experimental protocols and discussion (Sections 5-6).

Section 2 establishes precise mathematical definitions. Section 3 states and proves the main theorem with complete rigor. Section 4 provides a fully worked example using the [[5,1,3]] perfect code. Section 5 details experimental protocols for ion traps and superconducting qubits. Section 6 discusses implications, connections to holography, and open questions.

2 Definitions and Mathematical Setup

This section provides precise definitions of all terms used in the main theorem. Readers familiar with quantum error correction and circuit complexity may skim this section and refer back as needed.

2.1 Code Distance and Error Correction

Let =i=1ni be the physical Hilbert space with n subsystems (typically qubits, dimi=2). A quantum error-correcting code is an isometric embedding E:logical of a k-dimensional logical space into the 2n-dimensional physical space, with projector Pcode=EE onto the code subspace code=Im(E).

Remark on notation: The code projector Pcode is a projection operator (Hermitian, idempotent: Pcode2=Pcode, Pcode=Pcode) that projects the full Hilbert space onto the code subspace. It can be equivalently defined as:

  • Pcode=EE where E is the isometric encoding map, or

  • Pcode=j(1+Sj)/2 where {Sj} are stabilizer generators (for stabilizer codes)

Both definitions are equivalent for stabilizer codes [GOT97]. We use the encoding map form for generality.

Definition 1 (Weight Function).

For an operator E(), the weight function wt(E) counts the number of subsystems on which E acts non-trivially:

wt(E)=min|{i[n]:E=ESIS¯,S[n],|S|=wt(E)}|

where ES acts on iSi and IS¯ is the identity on the complement. Equivalently, for qubits, wt(E) is the number of non-identity factors in the minimal Pauli decomposition of E.

Definition 2 (Code Distance).

The distance d of a code with projector Pcode is:

d=min{wt(E):E(),PcodeEPcode∝̸Pcode,E0}

This is the minimum weight of any operator that acts non-trivially on the code subspace.

Notation: We use d (without subscript) throughout this paper to denote code distance. When emphasizing it is a property of the code, we write dcode, but both notations are equivalent: d=dcode.

A code with distance d can detect errors on any d1 qubits and correct errors on any (d1)/2 qubits. This follows from the Knill-Laflamme error correction conditions [KL97]: a code with distance d can correct errors on any (d1)/2 qubits, meaning errors with weight less than d/2 are correctable.

2.2 Locality and Algorithmic Complexity

Definition 3 (Logically Trivial Operation).

An operation U is logically trivial on code subspace code if and only if:

PcodeUPcode=eiϕPcode

for some global phase ϕ. Equivalently, U preserves all logical information up to an unobservable phase.

Definition 4 (Support and Locality).

For a unitary U acting on =i=1ni:

  • The support supp(U) is the minimal set S[n] such that U=USIS¯ for some unitary US on iSi.

  • The locality parameter is =|supp(U)| (the cardinality of the support set).

  • For qubits arranged on a lattice Λ, the coordination number z=z(Λ) is the maximum degree of any vertex in the connectivity graph (e.g., z=2 for 1D chains, z=4 for 2D square lattices, z=6 for 3D cubic lattices).

Notation consistency: Throughout this paper, we use =|supp(U)| to denote support size. When referring to the support set itself, we write supp(U); when referring to its cardinality, we write |supp(U)| or equivalently .

Definition 5 (Circuit Complexity).

For a unitary U implementable by a circuit 𝒞 from a universal finite gate set 𝒢:

  • The circuit depth D(U) is the time-like length of the circuit DAG—the longest chain of sequential gate dependencies. For a circuit with layered structure, this is the number of sequential layers.

  • The gate complexity is G(U)=min{|𝒞|:𝒞 implements U}, where |𝒞| is the total number of gates.

Critical distinction: Circuit depth D and gate count G are related but distinct. For a circuit with D layers and up to n gates per layer, GD (with equality only for fully-parallelized circuits). Theorem 1 bounds support in terms of depth D, not gate count G.

For this paper, we use gate complexity G(U) as our measure of algorithmic complexity: 𝒞alg(U):=G(U).

Note: Some authors use log2(G) for information-theoretic interpretations. We use G directly for consistency with circuit complexity literature.

This definition captures the computational cost of implementing U using local gates. It aligns with standard circuit complexity in quantum computation [NC00] and holographic complexity proposals [SUS16, BRS+16].

3 Main Result: Complexity-Bounded Locality

We now state and prove the main theorem. This establishes a quantitative relationship between circuit complexity, code distance, and locality.

Lemma 1 (Knill-Laflamme Projection).

Let code be a code with distance d and projector Pcode. For any operator E with wt(E)<d:

PcodeEPcode=cEPcode

where cE=Tr(PcodeE)/dim(code).

Proof.

By the Knill-Laflamme conditions [KL97], for wt(E)<d:

ψi|E|ψj=cEδij

for all code basis states |ψi. This means E restricted to the code subspace is diagonal with constant entries cE. Hence PcodeEPcode=cEPcode. ∎

Lemma 2 (L1 Ball Volume).

The number of lattice sites in d within L1 distance R of the origin is:

Vd(R)=|{vd:v1R}|=j=0min(R,d)(dj)(Rj)2j

For fixed d and large R:

Vd(R)=(2R)dd!+O(Rd1)
Proof.

This is a standard result in combinatorics (see [STA97]). The count follows from partitioning lattice points by the number of nonzero coordinates and using inclusion-exclusion. ∎

Theorem 1 (Locality from Code Distance).

Let code be a quantum error-correcting code with distance d. Let U be a unitary operation.

(a) Support-Based Triviality: If :=|supp(U)|<d/2, then:

PcodeUPcode=eiϕPcode

for some phase ϕ. That is, U acts trivially on the code subspace.

(b) Circuit Depth Bound on Support: If U is implemented by a depth-D circuit using k-local nearest-neighbor gates on a d-dimensional hypercubic lattice, and U initially acts on 0 qubits in a connected region, then:

|supp(U)|Vd((k1)D)+01

where Vd(R) is the number of lattice sites within L1 distance R of the origin:

  • 1D: V1(R)=2R+1, giving D0+2(k1)D

  • 2D: V2(R)=2R2+2R+1, giving D=O(D2)

  • 3D: V3(R)=43R3+2R2+83R+1, giving D=O(D3)

Corollary (Depth Threshold for Triviality): Combining (a) and (b), we obtain dimension-dependent thresholds:

1D Lattice: If

D<dcode/202(k1)

then U|codeId.

Derivation (1D): Set 0+2(k1)D<dcode/2 and solve for D:

2(k1)D<dcode/20D<dcode/202(k1)

2D Lattice: If

D<1+1+2(dcode/20)2dcode/202

then U|codeId.

Derivation (2D): For k=2 (nearest-neighbor), we require V2((k1)D)+01<dcode/2:

2((k1)D)2+2((k1)D)+1+01 <dcode/2
2D2+2D+0 <dcode/2
2D2+2D <dcode/20

Solving the quadratic 2D2+2D(dcode/20)=0 using the quadratic formula with a=2, b=2, c=(dcode/20):

D=2+4+8(dcode/20)4=2+21+2(dcode/20)4=1+1+2(dcode/20)2

For large dcode, 1+2x2x when x1, giving D(dcode/20)/2.

3D Lattice: If D satisfies 43D3+2D2+83D+0<dcode/2, then U|codeId. For large dcode, this gives D(3dcode/8)1/3.

Derivation (3D): For k=2, we require V3(D)+01<dcode/2:

43D3+2D2+83D+0<dcode/2

For large dcode where the cubic term dominates: 43D3dcode/2, giving D(3dcode8)1/3.

For nearest-neighbor gates (k=2) on all lattice geometries, the threshold scales as D(dcode)1/dlattice where dlattice is the spatial dimension.

Proof.

We prove each part rigorously using the Knill-Laflamme error correction conditions.

Part (a): Support-Based Triviality.

Step 1: Pauli decomposition. Any operator U on n qubits can be decomposed in the Pauli basis:

U=P𝒫ncPP

where 𝒫n={I,X,Y,Z}n is the n-qubit Pauli group.

Step 2: Support constraint. If |supp(U)|=, then all Pauli strings P with cP0 satisfy wt(P).

Step 3: Knill-Laflamme conditions. For a code with distance d, the Knill-Laflamme conditions [KL97] state: for any operator E with wt(E)<d,

ψi|E|ψj=cEδij

for all code basis states |ψi,|ψj and some constant cE.

Step 4: Application to U. Since <d/2<d, every Pauli string P in the decomposition of U satisfies wt(P)<d. By Knill-Laflamme:

PcodePPcode=cPPcode

for each such P. Summing:

PcodeUPcode=PcPcPPcode=(PcPcP)Pcode

Step 5: Unitarity determines phase. Since U is unitary, PcodeUPcode must also be proportional to a unitary on the code subspace. The only unitary proportional to the identity is eiϕId for some ϕ.

Part (b): Circuit Depth Bound on Support.

We prove the support bound using the lightcone containment principle.

Step 1: Graph distance in lattices. For a d-dimensional hypercubic lattice d, the graph distance between sites u,vd equals the L1 (taxicab) distance:

dgraph(u,v)=uv1=i=1d|uivi|

A single nearest-neighbor gate couples sites at graph distance 1. A k-local gate can couple sites at graph distance up to k1.

Step 2: Lightcone definition. Define the depth-D lightcone from an initial set S0 as:

D(S0)={vd:dgraph(v,S0)(k1)D}

where dgraph(v,S0)=minuS0dgraph(v,u).

Step 3: Lightcone containment. Claim: For any depth-D circuit U with k-local gates initially acting on S0:

supp(U)D(S0)

Proof by induction:

  • Base case (D=0): The identity has supp(Id)=S00(S0).

  • Inductive step: Assume supp(UD)D(S0). Adding one layer of k-local gates can extend the support to sites within graph distance (k1) of the current support. Since

    {v:dgraph(v,supp(UD))k1}{v:dgraph(v,S0)(k1)(D+1)}=D+1(S0)

    we have supp(UD+1)D+1(S0).

Step 4: Volume bound. The size of the lightcone is bounded by the L1 ball volume:

|D(S0)|Vd((k1)D)+01

where Vd(R)=|{vd:v1R}| is the volume of the discrete L1 ball.

Step 5: Explicit volume formulas. The L1 ball volume in d dimensions is (see e.g., [STA97]):

V1(R) =2R+1 (1)
V2(R) =2R2+2R+1 (2)
V3(R) =43R3+2R2+83R+1 (3)
Vd(R) =j=0min(R,d)(dj)(Rj)2j=(2R)dd!+O(Rd1) (4)

Step 6: Conclusion. Therefore:

|supp(U)|Vd((k1)D)+01

For 1D lattices: |supp(U)|2(k1)D+0 (linear in D).

For 2D lattices: |supp(U)|2(k1)2D2+2(k1)D+0=O(D2) (quadratic).

For 3D lattices: |supp(U)|=O(D3) (cubic).

This completes the proof. ∎

Geometry k z Support bound Growth
1D chain, nearest-neighbor 2 2 0+2D O(D)
2D square, nearest-neighbor 2 4 0+2D2+2D O(D2)
3D cubic, nearest-neighbor 2 6 0+43D3+O(D2) O(D3)
All-to-all connectivity 2 n min(n,0+2D) O(D)
Table 1: Support bounds for different lattice geometries with 2-local gates. The growth rate depends on lattice dimension: O(Ddlattice).
Remark 1 (Lieb-Robinson Bounds vs. Circuit Depth).

The Lieb-Robinson bound [LR72] constrains information spreading under continuous Hamiltonian evolution:

[A(x,0),B(y,t)]Ceμ(rvLRt)

where vLR=2ezJ/ is the Lieb-Robinson velocity.

Important distinction: This bound applies to time evolution eiHt, not to discrete gate circuits. For circuits, support grows linearly with depth (Theorem 1(b)), which is generally tighter than the Lieb-Robinson bound.

The Lieb-Robinson velocity becomes relevant when approximating Hamiltonian evolution by Trotterization: if eiHt is approximated by a depth-D circuit, then DvLRt/a where a is lattice spacing. This connects the two bounds but they are not equivalent.

4 Explicit Example: The [[5,1,3]] Perfect Code

We now demonstrate the theorem with a complete worked example, providing numerical values for all quantities.

4.1 Code Parameters

Consider the [[5,1,3]] perfect quantum code [GOT96, Laflamme1996], which encodes k=1 logical qubit into n=5 physical qubits with distance d=3. This code has the following properties:

  • Physical Hilbert space: phys=(2)5, dim=32

  • Code subspace: code=2, dim=2

  • Distance: d=3 (corrects any single-qubit error)

  • Stabilizers: Four independent generators, each weight-4 Pauli operators

  • Locality threshold: c=d/2=1.5 (operations on 1 qubits are trivial)

The encoding circuit requires 7 two-qubit gates and can be implemented with depth D=5 on a linear qubit array [NC00].

4.2 Single-Qubit Operations (=1<d/2)

Support analysis: For a single-qubit operation U=Rz(θ)I4 acting on qubit 1:

=|supp(U)|=1 (5)
dimphys(1) =2 (6)
log2dimphys(1) =1 bit (7)

Verification via Knill-Laflamme conditions: Since =1<d/2=1.5, Theorem 1(a) guarantees:

PcodeRz(θ)I4Pcode=eiϕPcode

for some phase ϕ. The operation is logically trivial regardless of rotation angle θ.

Indeed, by stabilizer formalism, any single-qubit Pauli or Clifford operation either commutes with all stabilizers (trivial) or can be absorbed into stabilizer measurements [GOT97].

4.3 Two-Qubit Operations (=2d/2)

At the threshold: For a two-qubit operation U=CNOT12I3:

=2=d/2(exactly at threshold) (8)
dimphys(2) =4 (9)
log2dimphys(2) =2 bits (10)

Since =2=d/2, we are exactly at the locality threshold. Operations with d/2 can implement non-trivial logical gates. Indeed, two-qubit operators on the [[5,1,3]] code can realize logical Paulis: applying CNOTs between specific qubit pairs implements logical gates [NC00].

4.4 Circuit Depth Threshold

Threshold calculation: For the [[5,1,3]] code on a 1D chain with 2-local gates:

  • Code distance: d=3

  • Coordination number: z=2 (1D chain)

  • Locality parameter: k=2 (nearest-neighbor gates)

  • Initial support: 0=1 (starting on one qubit)

The circuit depth threshold from Theorem 1 corollary:

D<d/20(k1)z=1.51(21)2=0.52=0.25

Therefore, any operation with depth D<0.25 (i.e., D=0) starting from a single qubit remains logically trivial. Depth D1 can potentially reach =3 qubits, exceeding the threshold d/2=1.5, enabling non-trivial logical operations.

Scaling with code distance: Larger codes allow deeper circuits before non-triviality:

d=5:Dcrit =2.512=0.75(depth 0 is trivial) (11)
d=7:Dcrit =3.512=1.25(depth 0-1 trivial) (12)
d=11:Dcrit =5.512=2.25(depth 0-2 trivial) (13)

5 Experimental Protocols

We provide concrete protocols for testing Theorem 1 in quantum computing platforms. These protocols are designed to verify the circuit depth threshold from the theorem’s corollary.

5.1 Falsification Criteria

For Theorem 1 to be experimentally validated, explicit numerical thresholds must be met. We provide success/failure criteria at the 95% confidence level:

Ion Trap ([[5,1,3]] code):

  • Strong confirmation: If measured triviality probability >0.95 for circuits with D<Dcrit across all tested codes, the theorem is supported (single-qubit operations with =1<d/2=1.5 maintain logical fidelity).

  • Weak confirmation: If 0.75<<0.95, the theorem is partially supported (possible finite-size effects or experimental imperfections).

  • Falsification: If <0.50 for D<Dcrit, the theorem is falsified (circuit is non-trivial despite depth threshold).

  • Threshold sharpness: Sharp transition in logical error rate at support d/2 with width Δ<1.5 qubits. If transition width Δ>2 qubits, threshold behavior is not sharp as predicted.

Surface Code (d=5, n=49):

  • Success: Logical error rate fits pL()exp(β(d/2)) for <d/2 with fitted parameter β>0.3 and fit quality R2>0.85.

  • Partial success: If 0.15<β<0.3 or 0.70<R2<0.85, the exponential threshold exists but is weaker than predicted (possible finite-size or noise effects).

  • Falsification: If fit quality R2<0.70 or fitted β<0.15 (two standard deviations below predicted value), the threshold behavior is not observed and the theorem is falsified.

  • Support bound test: Measured support growth obs(D)0+(k1)zD+Δ with tolerance Δ<2 qubits. If Δ>3 qubits systematically, the bound is violated.

Numerical Simulation:

  • Success: Phase boundary in (D,0) space matches theoretical prediction D=(d/20)/((k1)z) within 10% (allowing for discretization effects).

  • Falsification: If measured critical depth Dc differs from theory by more than 20%, or if triviality persists for >1.2(d/2), the distance threshold is violated.

Statistical justification: These thresholds are chosen to separate signal from noise at the 95% confidence level, allowing for experimental imperfections (gate errors, measurement errors, finite sampling) while maintaining statistical rigor. The threshold values (>0.95, β>0.3, R2>0.85) correspond to effect sizes detectable with 100-1000 experimental runs per configuration.

5.2 Ion Trap Implementation

System: 5-ion linear chain (e.g., 171Yb+ or 40Ca+) implementing the [[5,1,3]] code.

Preparation Phase:

  1. Initialize all ions in |0 via optical pumping

  2. Apply encoding circuit (7 two-qubit gates, depth D=5) to prepare logical |0¯

  3. Verify encoding via stabilizer measurements (Z-type and X-type)

  4. Measure encoding fidelity: target >99%

Test Phase:

  1. Apply single-ion rotation: Rz(θ) on ion 1, sweep θ[0,2π]

  2. Measure all four stabilizers: S1,S2,S3,S4

  3. Verify stabilizer outcomes: all should remain +1 (eigenvalue unchanged)

  4. Decode to logical basis and measure logical state: should remain |0¯

  5. Repeat for ions 2-5 to verify position independence

Threshold Test:

  1. Apply two-ion Mølmer-Sørensen gate: U=eiϕ(σx(1)σx(2)+σy(1)σy(2))

  2. Sweep interaction angle ϕ[0,π/2]

  3. For ϕ<ϕc: expect logical state unchanged (below threshold)

  4. For ϕϕc: expect logical rotation (above threshold)

  5. Determine critical angle ϕc from transition point

Expected Results:

  • Single-ion operations: fidelity (|0¯)>99.9% for all θ (logically trivial as =1<d/2)

  • Two-ion operations: sharp transition at ϕc with width Δϕ1/d0.58

  • Threshold consistent with =d/2=1.5 for non-triviality

5.3 Superconducting Qubit Implementation

System: Surface code on 2D grid (e.g., Google Sycamore or IBM Quantum) with distance d=5.

Code Parameters:

  • Physical qubits: n=49 (7×7 grid)

  • Logical qubits: k=1

  • Distance: d=5 (corrects 2-qubit errors)

  • Threshold: c=2.5 (3-qubit operations can be non-trivial)

Protocol:

  1. Prepare logical |0¯ using standard surface code encoding

  2. Apply operations on =1,2,3 qubits within a connected patch

  3. Measure syndrome via ancilla readout (stabilizer measurements)

  4. Track logical error rate pL vs. support size

  5. Fit to theory: pLexp(β(d/2)) for <d/2

Circuit Depth Measurement:

  • Count gate depth D for each test operation

  • Verify support bound: 0+(k1)zD with z=4 (2D square lattice)

  • Plot pL vs. support size to verify threshold c=d/2

  • Confirm sharp transition at threshold

5.4 Numerical Simulation

For verification and parameter exploration beyond current experimental capabilities:

Stabilizer Simulator:

  • Use Stim [GID21] or Qiskit Aer to simulate codes up to n=100 qubits

  • Implement [[n,k,d]] CSS codes with varying distance d[3,15]

  • Apply random circuits with controlled support [1,d]

  • Measure logical fidelity vs. and extract transition point

Parameter Sweep:

  1. Fix code distance d

  2. Sweep circuit depth D[1,50] and initial support 0[1,d/2]

  3. Compute final support =0+(k1)zD for each configuration

  4. Classify as logically trivial (<d/2) or non-trivial (d/2) via Knill-Laflamme check

  5. Plot phase diagram in (D,0) space

  6. Verify boundary matches threshold D=(d/20)/((k1)z)

Support Growth Verification:

  • Apply random circuits with varying depth D on different lattices

  • Track actual support size vs. theoretical bound 0+(k1)zD

  • Verify bound is tight for worst-case circuit configurations

  • Compare 1D, 2D, and 3D lattice geometries

6 Discussion and Implications

6.1 Proven Results

6.1.1 Comparison with Lieb-Robinson Bounds

Both our complexity threshold (Theorem 1) and the Lieb-Robinson bound [LR72] limit locality, but their nature differs fundamentally:

Lieb-Robinson (dynamical):

  • Bounds time evolution of operators: [A(x,t),B(y,0)]Ceμ(rvLRt)

  • Applies to any local Hamiltonian evolution

  • Constrains how fast information spreads through space

  • Velocity vLR determined by Hamiltonian parameters

Circuit Depth Threshold (operational):

  • Bounds operations an observer can implement: D<(d/20)/((k1)z) logically trivial

  • Applies to observers with finite circuit depth

  • Constrains what logical transformations are accessible

  • Threshold determined by code distance d, lattice coordination z, and gate locality k

The Lieb-Robinson velocity does not appear in our main theorem. It relates continuous Hamiltonian evolution to circuit implementations, but Theorem 1 is purely about discrete circuits. Our bound is not about dynamical spreading—it’s about the detectability of operations within error-correcting codes.

6.2 Conjectured Extensions

6.2.1 Conjectured Holographic Connection (Speculative)

Caveat: The following connection to holographic spacetimes is highly speculative and requires substantial independent justification beyond the scope of this work. We present it as a potential application, not as a proven consequence of Theorem 1.

In the AdS/CFT correspondence [MAL98], the boundary theory may implement a quantum error-correcting code that encodes bulk physics [ADH15, PYH+15]. If this holographic error correction conjecture holds, our result would suggest connections to bulk locality:

Conjectured boundary-bulk connection: If the boundary code has distance d related to bulk geodesic distance, then boundary operators with support <d/2 cannot probe bulk physics—they would act trivially on the logical (bulk) subspace. This would provide an operational definition of ”local” on the boundary consistent with entanglement wedge reconstruction [ADH15].

Future investigation required: Testing this connection requires:

  • Verifying that holographic codes satisfy the distance-support relationship (Theorem 1)

  • Establishing whether the code distance d in AdS/CFT scales with appropriate geometric quantities

  • Determining the relationship (if any) between circuit depth and bulk complexity growth [SUS16]

These are open questions beyond the scope of this paper. Our contribution is the QEC result (Theorem 1); holographic applications remain speculative.

6.2.2 Implications for Quantum Complexity Theory

Circuit lower bounds: Theorem 1 provides a method for proving circuit lower bounds via error correction. If a unitary U acts non-trivially on a code with distance d, then the support must satisfy d/2, which implies circuit depth D(d/20)/((k1)z). This connects code distance to circuit depth, potentially useful for quantum advantage arguments.

Fault-tolerant computation: The threshold <d/2 is precisely the condition for fault tolerance [GOT97]. Our circuit depth formulation rephrases this in terms of observer resources: operations are fault-tolerant (logically trivial) when circuit depth is below (d/20)/((k1)z). This suggests fault tolerance emerges from bounded circuit depth rather than being imposed as an external condition.

Resource theory interpretation: Circuit depth D can be viewed as a resource in quantum resource theory [CG19]. Operations below the threshold are ”free” (logically trivial), while those above are ”costly” (require depth beyond error correction capacity). The threshold structure defines a depth-based resource theory with explicit conversion rates.

6.3 Future Work

Several directions remain for investigation:

Time-dependent evolution: We have focused on static circuits. How does the bound extend to continuous Hamiltonian evolution via Trotterization? The connection between continuous time t and discrete depth D requires careful analysis of Trotter errors and their impact on the support bound.

Tighter bounds for specific geometries: The support bound 0+(k1)zD is a worst-case estimate. For specific lattice geometries and circuit structures, tighter bounds may exist. For example, 1D chains have exact bounds, while 2D lattices may allow for geometric optimizations.

Non-Abelian codes: Our proof uses stabilizer formalism (Abelian codes). Can the result extend to non-Abelian quantum codes (e.g., twisted codes, subsystem codes)? The definition of code distance generalizes, but whether the threshold <d/2 persists requires investigation.

Experimental verification: While we have provided detailed protocols (Section 5), actual implementation on NISQ devices will test the theory. Measuring α empirically and comparing with theoretical predictions α=1/(dvLR) would provide strong validation.

Gravity connection: In quantum gravity, locality is emergent [SUS16]. Does our threshold play a role in deriving Einstein’s equations from entanglement [JAC95]? The connection between error correction and geometry [PYH+15] suggests our complexity bound might constrain gravitational dynamics.

6.4 Summary

We have established a quantitative relationship (Theorem 1) between circuit depth, quantum error correction, and logical triviality. The main results are:

  1. Circuit depth threshold: D<d/20(k1)zU|codeId for codes with distance d

  2. Support growth bound: |supp(U)|0+(k1)zD for depth-D circuits with k-local gates

  3. Worked example: [[5,1,3]] code with explicit numerical thresholds

  4. Experimental protocols: Ion trap, superconducting, and simulation tests with falsifiability criteria

  5. Conjectured holographic connection: Potential operational definition of locality in AdS/CFT (requires further investigation)

The result combines standard Knill-Laflamme conditions with circuit growth analysis. It provides a falsifiable, task-independent criterion for when circuit-based operations preserve encoded quantum information.

Acknowledgments

Mathematical formalism developed with AI assistance (Claude, Anthropic). The author takes full responsibility for all scientific claims.

Data and Code Availability

Computational validation code and experimental data are archived at DOI:10.5281/zenodo.17727423.

ORCID

Oksana Sudoma: 0009-0009-8469-1382

References

  • [ADH15] A. Almheiri, X. Dong, and D. Harlow (2015) Bulk locality and quantum error correction in ads/cft. JHEP 04, pp. 163. External Links: Document, 1411.7041 Cited by: §1, §6.2.1, §6.2.1.
  • [BRS+16] A. R. Brown, D. A. Roberts, L. Susskind, B. Swingle, and Y. Zhao (2016) Holographic complexity equals bulk action?. Phys. Rev. Lett. 116, pp. 191301. External Links: Document, 1509.07876 Cited by: §2.2.
  • [CG19] E. Chitambar and G. Gour (2019) Quantum resource theories. Rev. Mod. Phys. 91 (2), pp. 025001. External Links: 1806.06107 Cited by: §6.2.2.
  • [GID21] C. Gidney (2021) Stim: a fast stabilizer circuit simulator. External Links: 2103.02202 Cited by: 1st item.
  • [GOT96] D. Gottesman (1996) Class of quantum error-correcting codes saturating the quantum hamming bound. Phys. Rev. A 54, pp. 1862–1868. External Links: Document, quant-ph/9604038 Cited by: §4.1.
  • [GOT97] D. Gottesman (1997) Stabilizer codes and quantum error correction. Ph.D. Thesis, California Institute of Technology. External Links: quant-ph/9705052 Cited by: §1, §2.1, §4.2, §6.2.2.
  • [JAC95] T. Jacobson (1995) Thermodynamics of spacetime: the einstein equation of state. Phys. Rev. Lett. 75 (7), pp. 1260. External Links: gr-qc/9504004 Cited by: §6.3.
  • [KL97] E. Knill and R. Laflamme (1997) Theory of quantum error-correcting codes. Phys. Rev. A 55, pp. 900–911. External Links: Document, quant-ph/9604034 Cited by: §1, §2.1, §3, §3.
  • [KOL14] D. A. Kolb (2014) Experiential learning: experience as the source of learning and development. FT press. Cited by: §1.
  • [LR72] E. H. Lieb and D. W. Robinson (1972) The finite group velocity of quantum spin systems. Commun. Math. Phys. 28, pp. 251–257. External Links: Document Cited by: §1, §6.1.1, Remark 1.
  • [MAL98] J. Maldacena (1998) The large n limit of superconformal field theories and supergravity. Adv. Theor. Math. Phys. 2, pp. 231–252. External Links: Document, hep-th/9711200 Cited by: §6.2.1.
  • [NC00] M. A. Nielsen and I. L. Chuang (2000) Quantum computation and quantum information. Cambridge University Press. Note: 10th Anniversary Edition, 2010 External Links: ISBN 978-1107002173 Cited by: §2.2, §4.1, §4.3.
  • [PYH+15] F. Pastawski, B. Yoshida, D. Harlow, and J. Preskill (2015) Holographic quantum error-correcting codes: toy models for the bulk/boundary correspondence. JHEP 06, pp. 149. External Links: Document, 1503.06237 Cited by: §1, §6.2.1, §6.3.
  • [STA97] R. P. Stanley (1997) Enumerative combinatorics. Vol. 1, Cambridge University Press. Note: L1 ball volume formulas Cited by: §3, §3.
  • [SUS16] L. Susskind (2016) Computational complexity and black hole horizons. Fortschritte der Physik 64, pp. 24–43. Note: Submitted 2014 External Links: Document, 1402.5674 Cited by: §2.2, 3rd item, §6.3.