Quantum Supremacy and its Applications (!)

Slides:



Advertisements
Similar presentations
How Much Information Is In Entangled Quantum States? Scott Aaronson MIT |
Advertisements

The Learnability of Quantum States Scott Aaronson University of Waterloo.
Are Quantum States Exponentially Long Vectors? Scott Aaronson (who did and will have an affiliation) (did: IASwill: Waterloo) Distributions over n-bit.
Quantum Software Copy-Protection Scott Aaronson (MIT) |
Limitations of Quantum Advice and One-Way Communication Scott Aaronson UC Berkeley IAS Useful?
How Much Information Is In A Quantum State? Scott Aaronson MIT |
Quantum Double Feature Scott Aaronson (MIT) The Learnability of Quantum States Quantum Software Copy-Protection.
Pretty-Good Tomography Scott Aaronson MIT. Theres a problem… To do tomography on an entangled state of n qubits, we need exp(n) measurements Does this.
Scott Aaronson Institut pour l'Étude Avançée Le Principe de la Postselection.
QMA/qpoly PSPACE/poly: De-Merlinizing Quantum Protocols Scott Aaronson University of Waterloo.
The Computational Complexity of Linear Optics Scott Aaronson and Alex Arkhipov MIT vs.
Quantum Computing with Noninteracting Bosons
Solving Hard Problems With Light Scott Aaronson (Assoc. Prof., EECS) Joint work with Alex Arkhipov vs.
Quantum Money from Hidden Subspaces Scott Aaronson and Paul Christiano.
Robust Randomness Expansion Upper and Lower Bounds Matthew Coudron, Thomas Vidick, Henry Yuen arXiv:
Scott Aaronson (MIT) Forrelation A problem admitting enormous quantum speedup, which I and others have studied under various names over the years, which.
Short course on quantum computing Andris Ambainis University of Latvia.
Some Limits on Non-Local Randomness Expansion Matt Coudron and Henry Yuen /12/12 God does not play dice. --Albert Einstein Einstein, stop telling.
Computability and Complexity 20-1 Computability and Complexity Andrei Bulatov Random Sources.
Complexity and Cryptography
Interactive Proofs For Quantum Computations Dorit Aharonov, Michael Ben-Or, Elad Eban School of Computer Science and Engineering The Hebrew University.
The question Can we generate provable random numbers? …. ?
What are the minimal assumptions needed for infinite randomness expansion? Henry Yuen (MIT) Stellenbosch, South Africa 27 October 2015.
Verification of BosonSampling Devices Scott Aaronson (MIT) Talk at Simons Institute, February 28, 2014.
Scott Aaronson (MIT  UT Austin) Aspen Center for Physics, March 25, 2016 Joint work with Lijie Chen Complexity-Theoretic Foundations of Quantum Supremacy.
Scott Aaronson (MIT  UT Austin) Strachey Lecture, Oxford University May 24, 2016 Quantum Supremacy.
Quantum Computing and the Limits of the Efficiently Computable Scott Aaronson (MIT) Papers & slides at
MA/CSSE 473 Day 9 Primality Testing Encryption Intro.
Scott Aaronson (UT Austin) Banff, September 8, 2016 Joint work with Lijie Chen Complexity-Theoretic Foundations of Quantum Supremacy Experiments QSamp.
P & NP.
Topic 36: Zero-Knowledge Proofs
Scott Aaronson (MIT) April 30, 2014
Scott Aaronson (UT Austin)
Complexity-Theoretic Foundations of Quantum Supremacy Experiments
Complexity-Theoretic Foundations of Quantum Supremacy Experiments
Introduction to Randomized Algorithms and the Probabilistic Method
Scott Aaronson (UT Austin)
On the Size of Pairing-based Non-interactive Arguments
Randomness and Computation: Some Prime Examples
Scott Aaronson (MITUT Austin)
Bio Scott Aaronson is David J. Bruton Centennial Professor of Computer Science at the University of Texas at Austin.  He received his bachelor's from Cornell.
Zero Knowledge Anupam Datta CMU Fall 2017
with Weak Measurements
Modern symmetric-key Encryption
Understanding Randomness
Course Business I am traveling April 25-May 3rd
Shadow Tomography of Quantum States
Quantum Supremacy and its Applications
Three Questions About Quantum Computing
Scott Aaronson (MIT) Talk at SITP, February 21, 2014
Based on joint work with Alex Arkhipov
Certified Randomness from Quantum Supremacy Inimitability
Scott Aaronson (UT Austin)
Scott Aaronson (UT Austin) MIT, November 20, 2018
Three Questions About Quantum Computing
Certified Randomness from Quantum Supremacy Scott Aaronson (UT Austin)
Quantum Supremacy and its Applications (!)
Quantum Computing and the Quest for Quantum Computational Supremacy
Complexity-Theoretic Foundations of Quantum Supremacy Experiments
Gentle Measurement of Quantum States and Differential Privacy
ML – Lecture 3B Deep NN.
Quantum Supremacy and its Applications Inimitability
Complexity-Theoretic Foundations of Quantum Supremacy Experiments
Richard Cleve DC 2117 Introduction to Quantum Information Processing CS 667 / PH 767 / CO 681 / AM 871 Lecture 24 (2009) Richard.
Interactive Proofs Adapted from Oded Goldreich’s course lecture notes.
Scott Aaronson (UT Austin) Papers and slides at
Scott Aaronson (UT Austin) UNM, Albuquerque, October 18, 2018
Aspects of Certified Randomness from Quantum Supremacy
Gentle Measurement of Quantum States and Differential Privacy *
Stronger Connections Between Circuit Analysis and Circuit Lower Bounds, via PCPs of Proximity Lijie Chen Ryan Williams.
Presentation transcript:

Quantum Supremacy and its Applications (!) HELLO HILBERT SPACE Scott Aaronson University of Texas at Austin Sandia National Labs, February 8, 2019 Papers and slides at www.scottaaronson.com

#1 Application of quantum computing: Refute the QC skeptics! QUANTUM SUPREMACY |  #1 Application of quantum computing: Refute the QC skeptics! Groups at Google, IBM, Rigetti, IonQ and elsewhere are racing to achieve this with ~50-100 qubit systems. “Even if it’s useless, who cares?”

What if we just want maximum confidence that we’re solving something that’s classically exponentially hard? Theoretical work (Terhal-DiVincenzo 2004, A.-Arkhipov 2011, Bremner-Jozsa-Shepherd 2011…) has uncovered many advantages to switching our attention from problems with a single valid answer to sampling problems The classical hardness of sampling problems can even be based on the belief that the polynomial hierarchy is infinite Additional huge advantage: potential to realize these sampling speedups using near-term devices We “merely” give up on: obvious applications, a fast classical way to verify the result…? PostBQP: where we allow postselection on exponentially-unlikely measurement outcomes PostBPP: Classical randomized subclass Theorem (A. 2004): PostBQP = PP PostBPP is in the polynomial hierarchy PostBQP PostBPP

The Random Quantum Circuit Proposal Generate a quantum circuit C on n qubits in a nn lattice, with d layers of random nearest-neighbor gates Apply C to |0n and measure. Repeat T times, to obtain samples x1,…,xT from {0,1}n Check whether x1,…,xT solve the “Heavy Output Generation” (HOG) problem—e.g., do at least 2/3 of the xi’s have more than the median probability? (takes classical exponential time, which is OK for n70) Publish C. Challenge skeptics to generate samples passing the test in a reasonable amount of time

A. and Lijie Chen, arXiv:1612.05903 Theorem (paraphrased): Suppose there’s a poly-time classical “faking” algorithm—one that, given a a random quantum circuit C, with n qubits and m>>n gates, solves HOG with high probability. Then there’s also a poly-time classical algorithm to guess whether Pr[C outputs 0n] exceeds some threshold , with ~1/2n bias over flipping a coin Theorem: There is a poly-time classical algorithm to guess if Pr[C outputs 0n] >  with 1/exp(m) bias Theorem: There’s also a recursive classical algorithm to simulate C using mO(n) time and linear memory—“interpolating between Schrödinger and Feynman” But neither of these yield guessing algorithms that undermine the presumed hardness of HOG!

“But even if these sampling-based supremacy experiments work, they’ll just produce mostly-random bits, which is obviously useless…” 1101000011010011110110110011001100010100100110100011111011110100

Certified Random Bits: Who Needs ‘Em? For public use: Election auditing, lotteries, parameters for cryptosystems, zero-knowledge protocols, proof-of-stake cryptocurrencies… For private use: Cryptographic keys (a big one!) Trivial Quantum Randomness Solution! H |0 Problem: What if your quantum hardware was backdoored by the NSA? (Like the DUAL_EC_DRBG pseudorandom generator apparently was?) Want to trust a deterministic classical computer only PostBQP: where we allow postselection on exponentially-unlikely measurement outcomes PostBPP: Classical randomized subclass Theorem (A. 2004): PostBQP = PP PostBPP is in the polynomial hierarchy PostBQP PostBPP

Earlier Approach: Bell-Certified Randomness Generation Colbeck and Renner, Pironio et al., Vazirani and Vidick, Coudron and Yuen, Miller and Shi… Upside: Doesn’t need a QC; uses only “current technology” (though loophole-free Bell violations are only ~2 years old) Downside: If you’re getting the random bits over the Internet, how do you know Alice and Bob were separated?

Randomness from Quantum Supremacy Experiments SEED CHALLENGES Key Insight: A QC can solve certain sampling problems quickly—but under plausible hardness assumptions, it can only do so by sampling (and hence, generating real entropy) Upsides: Requires just a single device—good for certified randomness over the Internet. Ideal for near-term devices Caveats: Requires hardness assumptions and initial seed randomness. Verification (with my scheme) takes exp(n) time

INHERENTLY REQUIRES QUANTUM Why? Because a classical server could always replace its randomness source by a pseudorandom one without the client being able to detect it Indeed, our protocol requires certain tasks (e.g., finding heavy outputs of a quantum circuit) to be easy for QCs, and other tasks (e.g., finding the same heavy outputs every time) to be hard for QCs!

The Protocol 1. The classical client generates n-qubit quantum circuits C1,…,CT pseudorandomly (mimicking a random ensemble) 2. For each t, the client sends Ct to the server, then demands a response St within a very short time In the “honest” case, the response is a list of k samples from the output distribution of Ct|0n 3. The client picks O(1) random iterations t, and for each one, checks whether St solves the HOG problem 4. If these checks pass, then the client feeds S=S1,…,ST into a classical randomness extractor, to get nearly pure random bits Soundness theorem (in preparation): Under suitable (strong) computational hardness assumptions, if the server is a fast QC and the client accepts w.h.p., then conditioned on the client accepting, cn bits of min-entropy must be generated per iteration, for some constant c>0

Applications For the QC owner: Private randomness For those connecting over the cloud: Public randomness The protocol does require pseudorandom challenges, but: Even if the pseudorandom generator is broken later, the truly random bits will remain safe (“forward secrecy”) Even if the seed was public, the random bits can be private The random bits demonstrably weren’t known to anyone, even the QC, before it received a challenge (freshness)

Brakerski, Christiano, Mahadev, Vazirani, Vidick arXiv:1804.00640 Different Approach Brakerski, Christiano, Mahadev, Vazirani, Vidick arXiv:1804.00640 Method for a QC to generate random bits, assuming the quantum hardness of breaking lattice-based cryptosystems 2-to-1 function f, plus trapdoor f f(x) measurement basis measurement result Huge advantage of the BCMVV scheme over mine: Polynomial-time classical verification! Advantage of mine: Can be run on near-term devices!

Some Future Directions Can we prove quantum supremacy, as well as certified randomness, under more “standard” and less “boutique” computational hardness assumptions? Can we get polynomial-time classical verification with any of the problems solvable by near-term devices? Can we get more and more certified randomness by sampling with the same circuit C over and over? Would greatly improve the bit rate

Conclusions We might be close to 50-70 qubit quantum supremacy experiments. We can say interesting things about the hardness of simulating them classically; we’d like to say more Certified randomness generation: the most plausible application of a very-near-term QC? This application requires sampling problems: problems with definite answers (like factoring) are useless! Not only can we do it with ~70 qubits, we don’t want more. No expensive encoding needed; can fully exploit hardware “Try to embrace the weaknesses of near-term devices, and turn them into strengths…”