Quantum Counterfeit Coin Problems Kazuo Iwama (Kyoto Univ.) Harumichi Nishimura (Osaka Pref. Univ.) Rudy Raymond (IBM Research - Tokyo) Junichi Teruyama.

Slides:



Advertisements
Similar presentations
Quantum Lower Bound for the Collision Problem Scott Aaronson 1/10/2002 quant-ph/ I was born at the Big Bang. Cool! We have the same birthday.
Advertisements

Quantum Lower Bounds The Polynomial and Adversary Methods Scott Aaronson September 14, 2001 Prelim Exam Talk.
Quantum t-designs: t-wise independence in the quantum world Andris Ambainis, Joseph Emerson IQC, University of Waterloo.
Quantum Versus Classical Proofs and Advice Scott Aaronson Waterloo MIT Greg Kuperberg UC Davis | x {0,1} n ?
The Future (and Past) of Quantum Lower Bounds by Polynomials Scott Aaronson UC Berkeley.
Lower Bounds for Local Search by Quantum Arguments Scott Aaronson.
Pretty-Good Tomography Scott Aaronson MIT. Theres a problem… To do tomography on an entangled state of n qubits, we need exp(n) measurements Does this.
The Average Case Complexity of Counting Distinct Elements David Woodruff IBM Almaden.
Quantum walks: Definition and applications
Chapter 11 Limitations of Algorithm Power Copyright © 2007 Pearson Addison-Wesley. All rights reserved.
Efficient Discrete-Time Simulations of Continuous- Time Quantum Query Algorithms QIP 2009 January 14, 2009 Santa Fe, NM Rolando D. Somma Joint work with.
Fake coin detection. Fake coins Suppose we have a number of coins, at most one is fake (i.e. either one is fake or none is fake). You have a pair of scales.
MS 101: Algorithms Instructor Neelima Gupta
April 9, 2015Applied Discrete Mathematics Week 9: Relations 1 Solving Recurrence Relations Another Example: Give an explicit formula for the Fibonacci.
Discrete Structure Li Tak Sing( 李德成 ) Lectures
Cutler/HeadGrowth of Functions 1 Asymptotic Growth Rate.
KEG PARTY!!!!!  Keg Party tomorrow night  Prof. Markov will give out extra credit to anyone who attends* *Note: This statement is a lie.
Analysis of Algorithms CS 477/677 Instructor: Monica Nicolescu.
Department of Computer Science & Engineering University of Washington
Michael Bender - SUNY Stony Brook Dana Ron - Tel Aviv University Testing Acyclicity of Directed Graphs in Sublinear Time.
Testing Metric Properties Michal Parnas and Dana Ron.
Chapter 11: Limitations of Algorithmic Power
1 Recap (I) n -qubit quantum state: 2 n -dimensional unit vector Unitary op: 2 n  2 n linear operation U such that U † U = I (where U † denotes the conjugate.
Quantum Algorithms II Andrew C. Yao Tsinghua University & Chinese U. of Hong Kong.
Lecture 20: April 12 Introduction to Randomized Algorithms and the Probabilistic Method.
DAST 2005 Week 4 – Some Helpful Material Randomized Quick Sort & Lower bound & General remarks…
Chapter 11 Limitations of Algorithm Power Copyright © 2007 Pearson Addison-Wesley. All rights reserved.
One Complexity Theorist’s View of Quantum Computing Lance Fortnow NEC Research Institute.
Chapter 11 Limitations of Algorithm Power. Lower Bounds Lower bound: an estimate on a minimum amount of work needed to solve a given problem Examples:
Computational Complexity Polynomial time O(n k ) input size n, k constant Tractable problems solvable in polynomial time(Opposite Intractable) Ex: sorting,
Mathematics Review and Asymptotic Notation
October 1 & 3, Introduction to Quantum Computing Lecture 2 of 2 Richard Cleve David R. Cheriton School of Computer Science Institute for Quantum.
Theory of Computing Lecture 15 MAS 714 Hartmut Klauck.
Chapter 4: Induction and Recursion
Quantum Computing MAS 725 Hartmut Klauck NTU TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: A A A A.
Complexity of algorithms Algorithms can be classified by the amount of time they need to complete compared to their input size. There is a wide variety:
1 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 467 / Phys 767 C&O 481 / C&O 681 Richard Cleve DC 653 Course.
Lecture note 8: Quantum Algorithms
Algorithms Artur Ekert. Our golden sequence H H Circuit complexity n QUBITS B A A B B B B A # of gates (n) = size of the circuit (n) # of parallel units.
Quantum Factoring Michele Mosca The Fifth Canadian Summer School on Quantum Information August 3, 2005.
The Selection Problem. 2 Median and Order Statistics In this section, we will study algorithms for finding the i th smallest element in a set of n elements.
Sorting Fun1 Chapter 4: Sorting     29  9.
1 Lower Bounds Lower bound: an estimate on a minimum amount of work needed to solve a given problem Examples: b number of comparisons needed to find the.
Quantum Computing MAS 725 Hartmut Klauck NTU
Quantum random walks – new method for designing quantum algorithms Andris Ambainis University of Latvia.
Theory of Computation, Feodor F. Dragan, Kent State University 1 TheoryofComputation Spring, 2015 (Feodor F. Dragan) Department of Computer Science Kent.
Quantum random walks and quantum algorithms Andris Ambainis University of Latvia.
Analysis of Algorithms CS 477/677 Instructor: Monica Nicolescu Lecture 7.
CS 103 Discrete Structures Lecture 13 Induction and Recursion (1)
COSC 3101A - Design and Analysis of Algorithms 6 Lower Bounds for Sorting Counting / Radix / Bucket Sort Many of these slides are taken from Monica Nicolescu,
1 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 667 / Phys 767 C&O 481 / C&O 681 Richard Cleve DC 653 Lecture.
Quantum Computing MAS 725 Hartmut Klauck NTU
Analysis of Algorithm Lecture 2 Basics of Algorithms and Mathematics
NP-Completness Turing Machine. Hard problems There are many many important problems for which no polynomial algorithms is known. We show that a polynomial-time.
1. Searching The basic characteristics of any searching algorithm is that searching should be efficient, it should have less number of computations involved.
The Pigeonhole Principle Alan Kaylor Cline. The Pigeonhole Principle Statement Children’s Version: “If k > n, you can’t stuff k pigeons in n holes without.
Quantum Computation Stephen Jordan. Church-Turing Thesis ● Weak Form: Anything we would regard as “computable” can be computed by a Turing machine. ●
Approximation Algorithms by bounding the OPT Instructor Neelima Gupta
Section Recursion 2  Recursion – defining an object (or function, algorithm, etc.) in terms of itself.  Recursion can be used to define sequences.
Discrete Methods in Mathematical Informatics Kunihiko Sadakane The University of Tokyo
Jeffrey D. Ullman Stanford University.  A real story from CS341 data-mining project class.  Students involved did a wonderful job, got an “A.”  But.
1 Section 5.1 Analyzing Algorithms Let P be a problem and A an algorithm to solve P. The running time of A can be analyzed by counting the number of certain.
Richard Cleve DC 2117 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 667 / Phys 767 C&O 481 / C&O 681 Lecture.
Modeling with Recurrence Relations
Unbounded-Error Classical and Quantum Communication Complexity
Analysis and design of algorithm
Chapter 11 Limitations of Algorithm Power
Quantum Computation and Information Chap 1 Intro and Overview: p 28-58
The Pigeonhole Principle
Presentation transcript:

Quantum Counterfeit Coin Problems Kazuo Iwama (Kyoto Univ.) Harumichi Nishimura (Osaka Pref. Univ.) Rudy Raymond (IBM Research - Tokyo) Junichi Teruyama (Kyoto Univ.) ISAAC2010, Dec.15, 2010, Jeju (Korea)

Speedup by Quantum Algorithms Superpolynomial (or more)Quadratic (or less) Early-day's algorithm  Bernstein-Vazirani  Simon Shor's algorithm  Integer factoring  Discrete logarithm Shor's extentions  Pell's equation  Hidden subgroup problems Quantum walk algorithm  Glued trees graph Grover's algorithm  Unordered search Grover's application  Amplitude amplification  Quantum counting Quantum walk algorithm  Element distinctness  Graph problems (e.g., Triangle finding)  Spatial search (e.g., 2D-grid)  NAND tree Our algorithm achieves quartic speedup

Counterfeit Coin Problem You have eight similar coins and a beam balance. At most one coin is counterfeit and hence underweight. How can you detect whether there is an underweight coin, and if so, which one, using the balance only twice? The counterfeit coin problem is a well-known puzzle. [E.Schell, American Mathematical Monthly 52, p.46, 1945]

Counterfeit Coin Problem leans to Right Balanced leans to Left R 12 L B 3 R 45 L B 6 R 78 L ←Answer

Counterfeit Coin Problem There have been several different versions and extensions in the literature, say, more counterfeit coins, whether the counterfeit coins are underweight or overweight, they have the equal weight or not, and so on. Here, we assume: k false coins with equal weight are included in N given coins. The balance scale gives us only binary information, balanced (i.e., two sets of coins on the pans are equal in weight) or titled (different in weight) The goal is to find all the k false coins.

B-Oracle (Balance Oracle) Model Our setting is naturally considered as an oracle model : (Unknown) input : N bits Query string : N trits including the same number of 1's and (-1)'s Answer : 1 bit where (balanced) (tilted) B-oracle Ex

B-Oracle (Balance Oracle) Model Our setting is naturally considered as an oracle model : (Unknown) input : N bits Query string : N trits including the same number of 1's and (-1)'s Answer : 1 bit where (balanced) (tilted) When k=1, the query complexity (of finding the false coin) is log 2 N, which is also an information theoretic lower bound. B-oracle

Quantum Counterfeit Coin Problem Q. How about the quantum version of the counterfeit coin problem? The B-oracle model can be naturally quantized: We can identify what the oracle is if all final states are orthogonal. orthogonal = distinguishable

Quantum Counterfeit Coin Problem Q. What is the quantum query complexity of finding all the k false coins, that is, identifying the input x? Our goal is to answer the following question: k=1k=2k=3 general Quantum 112≤ k ≤3O(k 1/4 ) Classical log N ≥2log(N/2)≥3log(N/3) Ω(k log(N/k)) quartic speed-up (Note) So far, there are few natural problems whose quantum speed-up are between quadratic and exponential (ex. cubic [van Dam-Shparlinski 08]). Results

Algorithm

B-Oracle and IP oracle Notice a similarity between the B-oracle and the IP (Inner Product) oracle! (Unknown) input : N bits Query string : N trits including the same number of 1's and (-1)'s Answer : 1 bit where (balanced) (tilted) B-oracle (Unknown) input : N bits Query string : N bits Answer : 1 bit IP oracle

Case: k=1 So, we can identify the oracle by only 1 query! query to B-oracle under a reversible operation When k=1 (and the Hamming weight of the query string is even), the B-oracle can simulate IP oracle! The first half of the nonzero entries are -1 and the last half are 1 Key Fact orthogonal = distinguishable Bernstein-Vazirani 1997 [cf. Terhal-Smolin 1998]

General k In general, B-oracle and IP oracle are much different. But, we can still simulate IP oracle by O(k 1/4 ) queries to B-oracle! Find balanced pairs by the Grover search (exactly, amplitude amplification) If the Grover search finds a solution (=balanced pair), do nothing. Otherwise flip the phase. basis change Algorithm: Find*(k)

Lower bounds

Lower Bounds under Restricted Pan-size L :=the size of the pans (=the number of coins placed on each pan) L ≥ l ( L ≤ l, resp.) denotes the restriction that we should place at least l (at most l, resp.) coins the pans whenever we use the balance. [Lower bound under Restricted Pan-size] If L ≤ N/k 1+2ε or L ≥ N/k 1-4ε, then Ω(k ε ) queries are needed. In particular, if L ≤ O(N/k 1.5 ) or L ≥ Ω(N), then tight lower bound Ω(k 1/4 ) can be obtained. (Note) Algorithm Find*(k) is easily modified so that L ≥ Ω(N) can be satisfied. or

For Quantum Lower Bounds Two standard techniques Polynomial methods [Beals-Buhrman-Cleve-Mosca-de Wolf 1998] Adversary methods [Ambainis 2000] orthogonal = distinguishable =1

Lower Bounds under Restricted Pan-size L :=the size of the pans (=the number of coins placed on each pan) L ≥ l ( L ≤ l, resp.) denotes the restriction that we should place at least l (at most l, resp.) coins the pans whenever we use the balance. [Lower bound under Restricted Pan-size] If L ≤ N/k 1+2ε or L ≥ N/k 1-4ε, then Ω(k ε ) queries are needed. In particular, if L ≤ O(N/k 1.5 ) or L ≥ Ω(N), then tight lower bound Ω(k 1/4 ) can be obtained. (Note) Algorithm Find*(k) is easily modified so that L ≥ Ω(N) can be satisfied. placing few coins gives little information placing many coins gives little information l N/k 1/5 k 1/5

More Witness on the tightness of the O(k 1/4 )-Algorithm (Informal Statement) If the use of B-oracle is restricted so that the set of coins placed on the two pans can be partitioned into the left pan and right pan uniformly at random, we need Ω(k 1/4 ) queries. [Lower bound under "random-partition assumption" ] To show this statement rigorously, need to extend an oracle operation in a ''stochastic'' form extend an adversary method to the "stochastic'' oracle Notice that our algorithm is always used in such a way that the partition of the coins into the two pans is done uniformly at random. There seems no essentially better ways than this when using the B-oracle...

Conclusion We have investigated the quantum query complexity of finding k false coins from N coins by using the B-oracle, which represents a balance scale. We have obtained upper bound O(k 1/4 ), contrasting with the classical lower bound Ω(klog(N/k)). So this achieves quartic speed-up for a natural problem. We do not have a matching lower bound, but we have obtained several tight lower bounds under different restrictions of the ways that algorithms can take. At least, they imply that we need a radically new algorithm to beat the current upper bound.