Effcient quantum protocols for XOR functions

Slides:



Advertisements
Similar presentations
Estimating Distinct Elements, Optimally
Advertisements

1+eps-Approximate Sparse Recovery Eric Price MIT David Woodruff IBM Almaden.
Tight Bounds for Distributed Functional Monitoring David Woodruff IBM Almaden Qin Zhang Aarhus University MADALGO Based on a paper in STOC, 2012.
Optimal Space Lower Bounds for All Frequency Moments David Woodruff MIT
Quantum Lower Bounds You probably Havent Seen Before (which doesnt imply that you dont know OF them) Scott Aaronson, UC Berkeley 9/24/2002.
Quantum Lower Bounds The Polynomial and Adversary Methods Scott Aaronson September 14, 2001 Prelim Exam Talk.
How Much Information Is In Entangled Quantum States? Scott Aaronson MIT |
The Future (and Past) of Quantum Lower Bounds by Polynomials Scott Aaronson UC Berkeley.
Limitations of Quantum Advice and One-Way Communication Scott Aaronson UC Berkeley IAS Useful?
Parikshit Gopalan Georgia Institute of Technology Atlanta, Georgia, USA.
Numerical Linear Algebra in the Streaming Model Ken Clarkson - IBM David Woodruff - IBM.
Sublinear Algorithms … Lecture 23: April 20.
Approximate List- Decoding and Hardness Amplification Valentine Kabanets (SFU) joint work with Russell Impagliazzo and Ragesh Jaiswal (UCSD)
Circuit and Communication Complexity. Karchmer – Wigderson Games Given The communication game G f : Alice getss.t. f(x)=1 Bob getss.t. f(y)=0 Goal: Find.
Quantum Information and the PCP Theorem Ran Raz Weizmann Institute.
Gillat Kol (IAS) joint work with Ran Raz (Weizmann + IAS) Interactive Channel Capacity.
On the tightness of Buhrman- Cleve-Wigderson simulation Shengyu Zhang The Chinese University of Hong Kong On the relation between decision tree complexity.
Avraham Ben-Aroya (Tel Aviv University) Oded Regev (Tel Aviv University) Ronald de Wolf (CWI, Amsterdam) A Hypercontractive Inequality for Matrix-Valued.
On Gallager’s problem: New Bounds for Noisy Communication. Navin Goyal & Mike Saks Joint work with Guy Kindler Microsoft Research.
Quantum Algorithms II Andrew C. Yao Tsinghua University & Chinese U. of Hong Kong.
Shengyu Zhang CSE CUHK. Roadmap Intro to theoretical computer science Intro to quantum computing Export of quantum computing –Formula Evaluation.
Shengyu Zhang The Chinese University of Hong Kong.
Correlation testing for affine invariant properties on Shachar Lovett Institute for Advanced Study Joint with Hamed Hatami (McGill)
Tight Bounds for Graph Problems in Insertion Streams Xiaoming Sun and David P. Woodruff Chinese Academy of Sciences and IBM Research-Almaden.
Quantum Computing MAS 725 Hartmut Klauck NTU TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: A A A A.
Aug 2, Quantum Communication Complexity Richard Cleve Institute for Quantum Computing University of Waterloo.
Yang Liu Shengyu Zhang The Chinese University of Hong Kong Fast quantum algorithms for Least Squares Regression and Statistic Leverage Scores.
Communication Complexity Rahul Jain Centre for Quantum Technologies and Department of Computer Science National University of Singapore. TexPoint fonts.
One-way multi-party communication lower bound for pointer jumping with applications Emanuele Viola & Avi Wigderson Columbia University IAS work done while.
A limit on nonlocality in any world in which communication complexity is not trivial IFT6195 Alain Tapp.
Umans Complexity Theory Lectures Lecture 7b: Randomization in Communication Complexity.
Massive Data Sets and Information Theory Ziv Bar-Yossef Department of Electrical Engineering Technion.
Data Stream Algorithms Lower Bounds Graham Cormode
Fidelity of a Quantum ARQ Protocol Alexei Ashikhmin Bell Labs  Classical Automatic Repeat Request (ARQ) Protocol  Quantum Automatic Repeat Request (ARQ)
ArXiv: Hing Yin Tsang 1, Chung Hoi Wong 1, Ning Xie 2, Shengyu Zhang 1 1.The Chinese University of Hong Kong 2.Florida International University.
Hartmut Klauck Centre for Quantum Technologies Nanyang Technological University Singapore.
The Message Passing Communication Model David Woodruff IBM Almaden.
Additive Combinatorics in Theoretical Computer Science Shachar Lovett (UCSD)
Theory of Computational Complexity Probability and Computing Chapter Hikaru Inada Iwama and Ito lab M1.
Random Access Codes and a Hypercontractive Inequality for
Information Complexity Lower Bounds
Stochastic Streams: Sample Complexity vs. Space Complexity
New Characterizations in Turnstile Streams with Applications
Unbounded-Error Classical and Quantum Communication Complexity
And now for something completely different!
Communication Amid Uncertainty
Information primitives and laws of nature Mai 2008 Alain Tapp
Joint work with Avishay Tal (IAS) and Jiapeng Zhang (UCSD)
Branching Programs Part 3
Background: Lattices and the Learning-with-Errors problem
Tight Fourier Tails for AC0 Circuits
Linear sketching with parities
Quantum Information Theory Introduction
Uncertain Compression
Linear sketching over
Advances in Linear Sketching over Finite Fields
An Upper Bound on the GKS Game via Max Bipartite Matching
Linear sketching with parities
Classical Algorithms from Quantum and Arthur-Merlin Communication Protocols Lijie Chen MIT Ruosong Wang CMU.
Imperfectly Shared Randomness
Communication Amid Uncertainty
Visions for Theoretical Computer Science
CS21 Decidability and Tractability
What should I talk about? Aspects of Human Communication
Shengyu Zhang The Chinese University of Hong Kong
CS151 Complexity Theory Lecture 7 April 23, 2019.
Zeros of polynomial functions
New Jersey, October 9-11, 2016 Field of theoretical computer science
16. Mean Square Estimation
Introduction to Quantum Information Processing CS 467 / CS 667 Phys 467 / Phys 767 C&O 481 / C&O 681 Lecture 17 (2005) Richard Cleve DC 3524
Presentation transcript:

Effcient quantum protocols for XOR functions Shengyu Zhang The Chinese University of Hong Kong

Communication complexity 𝑥 𝑦 𝐹(𝑥,𝑦) Two parties, Alice and Bob, jointly compute a function 𝑓 on input (𝑥,𝑦). 𝑥 known only to Alice and 𝑦 only to Bob. Communication complexity*1: how many bits are needed to be exchanged? *1. A. Yao. STOC, 1979.

Computation modes Deterministic: Players run determ. protocol. ---𝐷(𝐹) Randomized: Players have access to random bits; small error probability allowed. --- 𝑅(𝐹) Quantum: Players send quantum messages. Share resource? (Superscript.) 𝑄 ∗ (𝐹): share entanglement. 𝑄(𝐹): share nothing Error? (Subscript) 𝑄 𝜖 (𝐹): bounded-error. 𝑄 𝐸 (𝐹): zero-error, fixed length.

Lower bounds Not only interesting on its own, but also important because of numerous applications. to prove lower bounds. Question: How to lower bound communication complexity itself? Communication matrix 𝑀 𝐹 ≝ 𝐹 𝑥,𝑦 𝑥,𝑦 : 𝑦 ↓ 𝑥→ 𝐹(𝑥,𝑦)

Log-rank conjecture Rank lower bound*1 Conj: The rank lower bound is polynomially tight. combinatorial measure ⇔ linear algebra measure. Equivalent to a bunch of other conjectures. related to graph theory*2; nonnegative rank*3, Boolean roots of polynomials*4, quantum sampling complexity*5. ≤ log 𝑂 1 𝑟𝑎𝑛𝑘 𝑀 𝐹 *1. Melhorn, Schmidt. STOC, 1982. *2. Lovász, Saks. FOCS, 1988. *3. Lovász. Book Chapter, 1990. *4. Valiant. Info. Proc. Lett., 2004. *5. Ambainis, Schulman, Ta-Shma, Vazirani, Wigderson, SICOMP 2003.

Log-rank conjecture: quantum version Rank lower bound log 2 𝑟𝑎𝑛𝑘 𝑀 𝐹 ≤𝐷 𝐹 Quantum: rank lower bound *1 log 2 𝑟𝑎𝑛 𝑘 𝜖 𝑀 𝐹 ≤ 𝑄 𝜖 𝐹 ≤ log 𝑂 1 𝑟𝑎𝑛 𝑘 𝜖 𝑀 𝐹 𝑟𝑎𝑛 𝑘 𝜖 𝑀 = min 𝑀 ′ :|𝑀(𝑥,𝑦)− 𝑀 ′ (𝑥,𝑦)|≤𝜖 𝑟𝑎𝑛𝑘( 𝑀 ′ ) ≤ log 𝑂 1 𝑟𝑎𝑛𝑘 𝑀 𝐹 *1. Buhrman, de Wolf. CCC, 2001.

Log-rank conjecture for XOR functions Since Log-rank conjecture appears too hard in its full generality,… let’s try some special class of functions. XOR functions: 𝑓(𝑥⊕𝑦). --- 𝐹=𝑓∘⊕ The linear composition of 𝑥 and 𝑦. Include important functions such as Equality, Hamming Distance, Gap Hamming Distance. Interesting connections to Fourier analysis of functions on 0,1 𝑛 .

Digression: Fourier analysis ∀𝑓: 0,1 𝑛 →ℝ can be written as 𝑓= 𝛼∈ 0,1 𝑛 𝑓 𝛼 𝜒 𝛼 𝜒 𝛼 𝑥 = −1 𝛼⋅𝑥 , and characters are orthogonal 𝑓 𝛼 :𝛼∈ 0,1 𝑛 : Fourier coefficients of 𝑓 Parseval: If 𝑅𝑎𝑛𝑔𝑒 𝑓 = +1,−1 , then 𝛼 𝑓 𝛼 2 =1. Two important measures: 𝑓 1 = 𝛼 𝑓 𝛼 --- Spectral norm. 𝑓 0 = 𝛼: 𝑓 𝛼 ≠0 --- Fourier sparsity. Cauchy-Schwartz: 𝑓 1 ≤ 𝑓 0 1/2 for 𝑓: 0,1 𝑛 →±1

Log-rank Conj. For XOR functions Interesting connections to Fourier analysis: 1. 𝑟𝑎𝑛𝑘 𝑀 𝑓∘⊕ = 𝑓 0 . Log-rank Conj: 𝐷 𝑓∘⊕ ≤ log 2 𝑂(1) 𝑓 0 . Thm.*1 𝐷 𝑓∘⊕ ≤ 2 𝑑 2 /2 log 𝑑−2 𝑓 1 Thm.*1 𝐷 𝑓∘⊕ ≤𝑂 𝑑 𝑓 1 . 𝑑= deg 2 (𝑓) : degree of 𝑓 as polynomial over 𝔽 2 . Fact*2. 𝑑≤ log 2 𝑓 0 . *1. Tsang, Wong, Xie, Zhang, FOCS, 2013. *2. Bernasconi and Codenotti. IEEE Transactions on Computers, 1999.

Quantum This talk: A simpler case 𝑄 𝐸 𝑓∘⊕ =O 2 𝑑 log 𝑓 0 . 𝑓 1,𝜖 = min 𝑔: 𝑓−𝑔 ∞ ≤𝜖 𝑔 1 𝑟𝑎𝑛 𝑘 𝜖 𝑀 = min 𝑀 ′ :|𝑀(𝑥,𝑦)− 𝑀 ′ (𝑥,𝑦)|≤𝜖 𝑟𝑎𝑛𝑘( 𝑀 ′ ) This paper: 𝑄 𝑓∘⊕ ≤ 𝑂 2 𝑑 log 𝑓 1,𝜖 , where 𝑑= deg 2 (𝑓) . Recall classical: 𝐷 𝑓∘⊕ ≤ 2 𝑑 2 /2 log 𝑑−2 𝑓 1 Confirms quantum Log-rank Conjecture for low-degree XOR functions. This talk: A simpler case 𝑄 𝐸 𝑓∘⊕ =O 2 𝑑 log 𝑓 0 . 𝑄 𝐸 𝑓∘⊕ =Ω log 𝑓 0 . *2 Ω log 𝑟𝑎𝑛 𝑘 𝜖 𝑀 𝑓∘⊕ ≥ *1. Lee and Shraibman. Foundations and Trends in Theoretical Computer Science, 2009. *2. Buhrman and de Wolf. CCC, 2001.

About quantum protocol Much simpler. log 𝑓 0 comes very naturally. Inherently quantum. Not from quantizing any classical protocol.

Goal: compute 𝑓(𝑥+𝑦) where 𝑓: 0,1 𝑛 → ±1 0 + 1 2 ⊗ 0 + 1 2 ⊗ 𝜓 = 𝛼∈𝐴 𝑓 𝛼 𝜒 𝛼 𝑥 𝐸 𝛼 𝜓 Add phase 𝜒 𝛼 (𝑦) 𝜓′ = 𝛼∈𝐴 𝑓 𝛼 𝜒 𝛼 𝑥 𝜒 𝛼 (𝑦) 𝐸 𝛼 𝜓′ 𝐸 𝛼 → 𝛼 𝛼∈𝐴 𝑓 𝛼 𝜒 𝛼 𝑥+𝑦 𝛼 Fourier: 𝛼 → 𝑡 𝜒 𝛼 𝑡 |𝑡〉 𝑡 𝛼∈𝐴 𝑓 𝛼 𝜒 𝛼 𝑥+𝑦 𝜒 𝛼 (𝑡) 𝑡 = 𝑡 𝑓 𝑥+𝑦+𝑡 𝑡 𝑡 0 +𝑓(𝑥+𝑦+𝑡) 1 2 𝑡

Goal: compute 𝑓(𝑥+𝑦) where 𝑓: 0,1 𝑛 → ±1 𝜓 =|+〉 𝛼∈𝐴 𝑓 𝛼 𝜒 𝛼 𝑥 𝐸 𝛼 𝜓 𝜓 =|+〉 𝛼∈𝐴 𝑓 𝛼 𝜒 𝛼 𝑥 𝐸 𝛼 𝜓 Add phase 𝜒 𝛼 (𝑦) 𝜓′ Decoding + Fourier One more issue: Only Alice knows 𝑡! Bob doesn’t. It’s unaffordable to send 𝑡. Obs: 𝑠𝑢𝑝𝑝 Δ 𝑡 𝑓 ⊆𝐴+𝐴,∀𝑡. 𝐴=𝑠𝑢𝑝𝑝 𝑓 𝑡 0 +𝑓(𝑥+𝑦+𝑡) 1 2 𝑡 Measure{|+〉,|−〉} Measure 𝑡 A random 𝑡∈ 0,1 𝑛 and 𝑓(𝑥+𝑦+𝑡). Recall our target: 𝑓(𝑥+𝑦). What’s the difference? The derivative: Δ 𝑡 𝑓 𝑧 =𝑓 𝑧+𝑡 𝑓(𝑧). Good: deg 2 ( Δ 𝑡 𝑓) ≤ deg 2 (𝑓) −1. Bad: Δ 𝑡 𝑓 0 ≤ 𝑓 0 2 . (That’s where the factor of 2 𝑑 comes from.)

Goal: compute 𝑓(𝑥+𝑦) where 𝑓: 0,1 𝑛 → ±1 0,1 𝑛 0,1 𝑛 𝜓 =|+〉 𝛼∈𝐴 𝑓 𝛼 𝜒 𝛼 𝑥 𝐸 𝛼 𝜓 Add phase 𝜒 𝛼 (𝑦) 𝐴+𝐴 ≝ 𝑎+𝑏:𝑎,𝑏∈𝐴 𝜓′ Decoding + Fourier One more issue: Only Alice knows 𝑡! Bob doesn’t. It’s unaffordable to send 𝑡. Obs: 𝑠𝑢𝑝𝑝 Δ 𝑡 𝑓 ⊆𝐴+𝐴,∀𝑡. 𝐴=𝑠𝑢𝑝𝑝 𝑓 𝑡 0 +𝑓(𝑥+𝑦+𝑡) 1 2 𝑡 𝐴 Measure{|+〉,|−〉} Measure 𝑡 A random 𝑡∈ 0,1 𝑛 and 𝑓(𝑥+𝑦+𝑡). Recall our target: 𝑓(𝑥+𝑦). What’s the difference? The derivative: Δ 𝑡 𝑓 𝑧 =𝑓 𝑧+𝑡 𝑓(𝑧). Good: deg 2 ( Δ 𝑡 𝑓) ≤ deg 2 (𝑓) −1. Bad: Δ 𝑡 𝑓 0 ≤ 𝑓 0 2 . (That’s where the factor of 2 𝑑 comes from.)

Goal: compute 𝑓(𝑥+𝑦) where 𝑓: 0,1 𝑛 → ±1 𝜓 =|+〉 𝛼∈𝐴 𝑓 𝛼 𝜒 𝛼 𝑥 𝐸 𝛼 𝜓 𝜓 =|+〉 𝛼∈𝐴 𝑓 𝛼 𝜒 𝛼 𝑥 𝐸 𝛼 𝜓 Add phase 𝜒 𝛼 (𝑦) 𝜓′ Decoding + Fourier One more issue: Only Alice knows 𝑡! Bob doesn’t. It’s unaffordable to send 𝑡. Obs: 𝑠𝑢𝑝𝑝 Δ 𝑡 𝑓 ⊆𝐴+𝐴,∀𝑡. 𝐴=𝑠𝑢𝑝𝑝 𝑓 Thus in round 2, Alice and Bob can just encode the entire 𝐴+𝐴. 𝑡 0 +𝑓(𝑥+𝑦+𝑡) 1 2 𝑡 Measure{|+〉,|−〉} Measure 𝑡 A random 𝑡∈ 0,1 𝑛 and 𝑓(𝑥+𝑦+𝑡). Recall our target: 𝑓(𝑥+𝑦). What’s the difference? The derivative: Δ 𝑡 𝑓 𝑧 =𝑓 𝑧+𝑡 𝑓(𝑧). Good: deg 2 ( Δ 𝑡 𝑓) ≤ deg 2 (𝑓) −1. Bad: Δ 𝑡 𝑓 0 ≤ 𝑓 0 2 . (That’s where the factor of 2 𝑑 comes from.)

At last, deg 2 𝑓 𝑑 =0, a constant function. Goal: compute 𝑓(𝑥+𝑦) where 𝑓: 0,1 𝑛 → ±1 𝜓 =|+〉 𝛼∈𝐴 𝑓 𝛼 𝜒 𝛼 𝑥 𝐸 𝛼 𝜓 Add phase 𝜒 𝛼 (𝑦) 𝜓′ Decoding + Fourier 𝑡 0 +𝑓(𝑥+𝑦+𝑡) 1 2 𝑡 Measure{|+〉,|−〉} Measure 𝑡 A random 𝑡∈ 0,1 𝑛 and 𝑓(𝑥+𝑦+𝑡). Compute 𝑓 2 ≝ Δ 𝑡 𝑓 𝑧 =𝑓 𝑧+𝑡 𝑓(𝑧). At last, deg 2 𝑓 𝑑 =0, a constant function. Cost: log 𝐴 + log 2𝐴 + log 4𝐴 +…+ log 2 𝑑−1 𝐴 ≤ 2 𝑑 log |𝐴| . Used trivial bound: 𝑘𝐴 ≤ 𝐴 𝑘

Open problems Get rid of the factor 2 𝑑 ! What can we say about additive structure of supp 𝑓 for Boolean functions 𝑓? Say, 𝐴+𝐴 ≤ 𝐴 1.5 ?

Thanks