P LAYING ( QUANTUM ) GAMES WITH OPERATOR SPACES David Pérez-García Universidad Complutense de Madrid Bilbao 8-Oct-2011.

Slides:



Advertisements
Similar presentations
1+eps-Approximate Sparse Recovery Eric Price MIT David Woodruff IBM Almaden.
Advertisements

Quantum Lower Bounds The Polynomial and Adversary Methods Scott Aaronson September 14, 2001 Prelim Exam Talk.
Quantum t-designs: t-wise independence in the quantum world Andris Ambainis, Joseph Emerson IQC, University of Waterloo.
QMA/qpoly PSPACE/poly: De-Merlinizing Quantum Protocols Scott Aaronson University of Waterloo.
Sublinear Algorithms … Lecture 23: April 20.
Parallel Repetition of Two Prover Games Ran Raz Weizmann Institute and IAS.
QCRYPT 2011, Zurich, September 2011 Lluis Masanes 1, Stefano Pironio 2 and Antonio Acín 1,3 1 ICFO-Institut de Ciencies Fotoniques, Barcelona 2 Université.
Problems and Their Classes
Circuit and Communication Complexity. Karchmer – Wigderson Games Given The communication game G f : Alice getss.t. f(x)=1 Bob getss.t. f(y)=0 Goal: Find.
Quantum Information and the PCP Theorem Ran Raz Weizmann Institute.
Random non-local games Andris Ambainis, Artūrs Bačkurs, Kaspars Balodis, Dmitry Kravchenko, Juris Smotrovs, Madars Virza University of Latvia.
Random non-local games Andris Ambainis, Artūrs Bačkurs, Kaspars Balodis, Dmitry Kravchenko, Juris Smotrovs, Madars Virza University of Latvia.
I NFORMATION CAUSALITY AND ITS TESTS FOR QUANTUM COMMUNICATIONS I- Ching Yu Host : Prof. Chi-Yee Cheung Collaborators: Prof. Feng-Li Lin (NTNU) Prof. Li-Yi.
Preparing Projected Entangled Pair States on a Quantum Computer Martin Schwarz, Kristan Temme, Frank Verstraete University of Vienna, Faculty of Physics,
Robust Randomness Expansion Upper and Lower Bounds Matthew Coudron, Thomas Vidick, Henry Yuen arXiv:
Fixing the lower limit of uncertainty in the presence of quantum memory Archan S. Majumdar S. N. Bose National Centre for Basic Sciences, Kolkata Collaborators:
Christian Schaffner CWI Amsterdam, Netherlands Position-Based Quantum Cryptography: Impossibility and Constructions Seminar Eindhoven, Netherlands Wednesday,
The Unique Games Conjecture with Entangled Provers is False Julia Kempe Tel Aviv University Oded Regev Tel Aviv University Ben Toner CWI, Amsterdam.
Theory of Computing Lecture 16 MAS 714 Hartmut Klauck.
Derandomized parallel repetition theorems for free games Ronen Shaltiel, University of Haifa.
1 Cryptography on weak BSS model of computation Ilir Çapuni
Some Limits on Non-Local Randomness Expansion Matt Coudron and Henry Yuen /12/12 God does not play dice. --Albert Einstein Einstein, stop telling.
Bell inequality & entanglement
Bell’s inequalities and their uses Mark Williamson The Quantum Theory of Information and Computation
Quantum Computing MAS 725 Hartmut Klauck NTU
Computability and Complexity 13-1 Computability and Complexity Andrei Bulatov The Class NP.
Northwestern University Winter 2007 Machine Learning EECS Machine Learning Lecture 13: Computational Learning Theory.
Avraham Ben-Aroya (Tel Aviv University) Oded Regev (Tel Aviv University) Ronald de Wolf (CWI, Amsterdam) A Hypercontractive Inequality for Matrix-Valued.
An Introduction to Black-Box Complexity
EECS 598: Background in Theory of Computation Igor L. Markov and John P. Hayes
Oded Regev (Tel Aviv University) Ben Toner (CWI, Amsterdam) Simulating Quantum Correlations with Finite Communication.
Computability and Complexity 24-1 Computability and Complexity Andrei Bulatov Approximation.
Algorithmic Problems in Algebraic Structures Undecidability Paul Bell Supervisor: Dr. Igor Potapov Department of Computer Science
Lecture 20: April 12 Introduction to Randomized Algorithms and the Probabilistic Method.
EECS 598 Fall ’01 Quantum Cryptography Presentation By George Mathew.
Paraty, Quantum Information School, August 2007 Antonio Acín ICFO-Institut de Ciències Fotòniques (Barcelona) Quantum Cryptography.
Is Communication Complexity Physical? Samuel Marcovitch Benni Reznik Tel-Aviv University arxiv
Feynman Festival, Olomouc, June 2009 Antonio Acín N. Brunner, N. Gisin, Ll. Masanes, S. Massar, M. Navascués, S. Pironio, V. Scarani Quantum correlations.
Paraty, Quantum Information School, August 2007 Antonio Acín ICFO-Institut de Ciències Fotòniques (Barcelona) Quantum Cryptography (III)
Theory of Computing Lecture 15 MAS 714 Hartmut Klauck.
1 Introduction to Quantum Information Processing CS 667 / PH 767 / CO 681 / AM 871 Richard Cleve DC 2117 Lecture 19 (2009)
QCCC07, Aschau, October 2007 Miguel Navascués Stefano Pironio Antonio Acín ICFO-Institut de Ciències Fotòniques (Barcelona) Cryptographic properties of.
Device-independent security in quantum key distribution Lluis Masanes ICFO-The Institute of Photonic Sciences arXiv:
On the logical structure of Bell theorems A. Broadbent, H. Carteret, A-A. Méthot, J. Walgate.
Quantum Teleportation and Bit Commitment Chi-Yee Cheung Chung Yuan Christian University June 9, 2009.
A limit on nonlocality in any world in which communication complexity is not trivial IFT6195 Alain Tapp.
1 Experimenter‘s Freedom in Bell‘s Theorem and Quantum Cryptography Johannes Kofler, Tomasz Paterek, and Časlav Brukner Non-local Seminar Vienna–Bratislava.
Black-box Tomography Valerio Scarani Centre for Quantum Technologies & Dept of Physics National University of Singapore.
Quantum Cryptography Slides based in part on “A talk on quantum cryptography or how Alice outwits Eve,” by Samuel Lomonaco Jr. and “Quantum Computing”
Recent Progress in Many-Body Theories Barcelona, 20 July 2007 Antonio Acín 1,2 J. Ignacio Cirac 3 Maciej Lewenstein 1,2 1 ICFO-Institut de Ciències Fotòniques.
Quantum Cryptography Christian Schaffner Research Center for Quantum Software Institute for Logic, Language and Computation (ILLC) University of Amsterdam.
The question Can we generate provable random numbers? …. ?
What are the minimal assumptions needed for infinite randomness expansion? Henry Yuen (MIT) Stellenbosch, South Africa 27 October 2015.
Quantum Cryptography Christian Schaffner Research Center for Quantum Software Institute for Logic, Language and Computation (ILLC) University of Amsterdam.
Liouville Dynamics and Classical Analogues of Information-Related Quantum Impossible Processes A.R. Plastino University of Pretoria, South Africa A.Daffertshofer.
1 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 467 / Phys 767 C&O 481 / C&O 681 Richard Cleve DC 3524 Course.
Quantum Cryptography Antonio Acín
Quantum Cryptography Christian Schaffner Research Center for Quantum Software Institute for Logic, Language and Computation (ILLC) University of Amsterdam.
1 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 467 / Phys 767 C&O 481 / C&O 681 Richard Cleve DC 3524 Course.
NP ⊆ PCP(n 3, 1) Theory of Computation. NP ⊆ PCP(n 3,1) What is that? NP ⊆ PCP(n 3,1) What is that?
Non-Locality Swapping and emergence of quantum correlations Nicolas Brunner Paul Skrzypczyk, Sandu Popescu University of Bristol.
Secret keys and random numbers from quantum non locality Serge Massar.
Non-locality and quantum games Dmitry Kravchenko University of Latvia Theory days at Jõulumäe, 2008.
Cryptography and Non-Locality Valerio Scarani Centre for Quantum Technologies National University of Singapore Ph.D. and post-doc positions available Barrett.
Information Complexity Lower Bounds
Introduction to Randomized Algorithms and the Probabilistic Method
On MPS and PEPS… David Pérez-García. Near Chiemsee
How to Delegate Computations: The Power of No-Signaling Proofs
Atom Chip Group, Ben Gurion University, Beersheba, Israel
Sequential sharing of nonlocal correlations
Presentation transcript:

P LAYING ( QUANTUM ) GAMES WITH OPERATOR SPACES David Pérez-García Universidad Complutense de Madrid Bilbao 8-Oct-2011

O UR GROUP 2 postdoctoral research positions opened in our group “Mathematics and Quantum Information”.

S TRUCTURE OF THE TALK The object under study: 2P1R games Examples. Why are they important? Complexity theory I. Inaproximability results. Complexity theory II. Parallel computation. Position based cryptography. Certifiable random number generation. A bit (just one bit!) of history. Where are the maths? Our contribution. Operator Spaces.

2P1R GAMES

x y a b 1.A set of possible questions for Alice and Bob (denoted by x,y resp.). 2.A known probability distribution for the questions. 3.A known boolean function V(x,y,a,b) which decides, based on questions and answers a,b, whether they witn (=1) or loose (=0) the game. 4.A limitation in the communication between Alice and Bob.

2P1R GAMES x y a b The value of the game is the largest probability of wining the game while optimizing over the possible strategies of Alice and Bob. It is assumed that Alice and Bob have free communication BEFORE the game to coordinate an strategy. Hence strategies can involve shared randomness (classical value of the game) or quantum entanglement (quantum value of the game) depending on the resources of Alice and Bob.

2P1R GAMES xy a b What is an strategy? A probability distribution p(ab|xy) Which are the possible strategies in the classical case? And in the quantum one?

EXAMPLES. I NAPROXIMABILITY

EXAMPLES. I NAPROXIMABILITY RESULTS Theorem (PCP theorem (Arora-Safra, 92)+ Parallel repetition (Raz, 94)): Unless P=NP, given e>0 and a polynomial algorithm to determine the classical value of a game, there exist games for which the value is 1 and the algorithm outputs a value <e. 01 e

E XAMPLES. I NAPROXIMABILITY RESULTS It is the mother of most inaproximability results. For instance: Theorem (Hastad, 1999): Unless P=NP, given e>0 and a polynomial algorithm to determine the MAX-CLIQUE of a graph, there exist graphs of n vertices for which Note that MAX-CLIQUE is always less or equal than n (!!)

E XAMPLES. I NAPROXIMABILITY RESULTS Connection with 2P1R games. Via LABEL-COVER. Given a bipartite graph And a set of colors And a set of valid configurations for each edge Find a coloring of the graph which maximizes the number of edges with a valid configuration.

E XAMPLES. I NAPROXIMABILITY RESULTS Connection with 2P1R games. Via LABEL-COVER. Colors Number of valid edges = 4 Solution to LABEL-COVER = 5

E XAMPLES. I NAPROXIMABILITY RESULTS Connection with 2P1R games. Via LABEL-COVER. Given and instance of LABEL-COVER, we define a 2P1R game by: Questions = vertices (from U to Alice and from W to Bob) with uniform probability between the pairs which conform an edge (and 0 in the rest). Answers = colors. They win the game if they give a valid coloring for the edge which is asked.

E XAMPLES. P ARALLEL COMPUTATION

Given a boolean function f(x,y), minimize c in: xy c bits of communication f(x,y)

E XAMPLES. P OSITION BASED CRYPTOGRAPHY. ( CHANDRAN ET AL, 2009)

E XAMPLES. P OSITION BASED CRYPTOGRAPHY 1D for simplicity xy a b AIM : That only someone in position P could answer with probability 1 to the challenge. It would allow unconditional secure communication !!! Coordinated Position P

E XAMPLES. P OSITION BASED CRYPTOGRAPHY Relation with 2P1R games. Since the verifiers act coordinated, we can assume there is just one of them. Based on answering times, we have: x y a b Communication “independent-one-way”

E XAMPLES. P OSITION BASED CRYPTOGRAPHY Hence, the aim is to find a challenge which can be won always with arbitrary communication (all classical challenges are like that) but not with “independent-one-way” communication. x y a b The honest case is the one of arbitrary communication, since there is only a single prover.

E XAMPLES. P OSITION BASED CRYPTOGRAPHY This is impossible classically. Both models of communication are the same. To see it, just copy and send the received question. In the quantum case (with no entanglement) it is indeed possible (Buhrman et al., 2010). The key idea lies on the fact that it is NOT possible to copy quantum states by the NO- CLONING theorem. Question: Is it also possible when a polynomial amount of entanglement is allowed? Partial answers (Beigi et al., Burhman et al, 2011): LINEAR = YES, EXPONENTIAL = NO.

E XAMPLES. R ANDOM NUMBER GENERATION ( PIRONIO ET AL., 2010)

E XAMPLE. R ANDOM NUMBER GENERATION PROBLEM: How to construct an apparatus which generates perfect random numbers (and hence secret) in a certifiable way? ….. could have a copy of ….. But in quantum mechanics copying is not allowed !!!

E XAMPLE. R ANDOM NUMBER GENERATION Theorem (Pironio et al., Colbeck et al., 2010): If (after many rounds in the game) one gets a value strictly larger than the classical one, there is a classical “deterministic” post-processing of the outputs a, b which produces numbers which are perfectly random and secret. xy a b DONE EXPERIMENTALLY ALREADY !!!

E XAMPLE. R ANDOM NUMBER GENERATION The key is, hence, the existence of quantum strategies which are NOT classical. This guarantees an intrinsic randomness. Classical Quantum Non- signaling

HISTORICAL NOTE The existence of this intrinsic randomness is precisely what Einstein did not believe in his criticism of quantum mechanics in the 30’s. The first experiment showing that, indeed, this randomness does ocurr was done by A. Aspect in the 80’s. The experiment was based precisely on the analysis of the value of a particular game, known as CHSH (Clauser, Horne, Shimony, Holt).

O UR CONTRIBUTION

T HE PROBLEM WE WANT TO ATTACK Estimate D. Parameters: Number of questions = N Number of answers = M Size (dimension) of the quantum system = d D Quantum strategies Classical strategies How large can D be?

V IOLATION OF A BELL INEQUALITY. F ORMAL DEFINITION OF D. Bell inquality T BELL INEQUALITY= 2P1R GAME (generalized)

O PERATIONAL INTERPRETATION OF D Bell Inequality T Where p is the maximum (classical) noise which a quantum strategy can withstand before getting classical. It is hence desirable to have a large D. How does D scale with the parameters N,M, d?

MAIN THEOREM Theorem (Junge, Palazuelos, Pérez-García, Villanueva, Wolf, CMP + PRL, 2010). D can be arbitrarily large, This requires: N= D^2 M= EXP(D) d= D^2 Theorem (Junge, Palazuelos, CMP, 2011). D can be arbitrarily large, This requires: N= D^2, M= D^2, d= D^2 Recent improvements Theorem (Buhrman et al, 2011). D can be arbitrarily large, This requires: N= D, M= EXP(D), d= D.

A N INTERESTING APPLICATION Theorem (Junge, Palazuelos, Pérez-García, Villanueva, Wolf, CMP + PRL, 2010). There exist quantum estrategies with EXP(N) questions, N answers and dimension of the quantum system N which need the communication of log(N) bits to be simulated classically. Quantum entanglement can save communication!!!

T HE TOOLS : O PERATOR SPACES

O PERATOR S PACES An operator space is a complex vector space E with a sequence of norms defined on such that: Given a C*-algebra, there exists a unique norm which makes a C*-algebra. With these norms, A is an operator space.

O PERATOR SPACES In particular: Given

O PERATOR SPACES The morphisms in this category are the completely bounded maps: CB(E,F) is an operator space via In particular E* is an operator space

C ONNECTION WITH THE 2P1R GAMES Theorem (Junge, Palazuelos, Pérez-García, Villanueva, Wolf, CMP + PRL, 2010). Given a 2P1R game (or more generally a Bell inequality) The classical value is given (with the order a,x,b,y) by the norm: The quantum value, by the norm:

Operator Spaces are the natural mathematical framework to analyze 2P1R games. Some references in this direction: 1.D. Pérez-García, M.M. Wolf, C. Palazuelos, I. Villanueva, M. Junge, Unbounded violations of Bell inequalities, Comm. Math. Phys. 279, 455 (2008) 2.M. Junge, C. Palazuelos, D. Pérez-García, I. Villanueva, M.M. Wolf, Operator Space theory: a natural framework for Bell inequalities, Phys. Rev. Lett. 104, (2010). 3.M. Junge, C. Palazuelos, D. Pérez-García, I. Villanueva, M.M. Wolf, Unbounded violations of bipartite Bell Inequalities via Operator Space theory, Comm. Math. Phys. 300, 715–739 (2010). 4.M. Junge, M. Navascués, C. Palazuelos, D. Pérez-García, V.B. Scholtz, R.F. Werner, Connes' embedding problem and Tsirelson's problem, J. Math. Phys. 52, (2011) 5.A.Salles, D. Cavalcanti, A. Acín, D. Pérez-García., M.M. Wolf, Bell inequalities from multilinear contractions, Quant. Inf. Comp. 10, (2010). 6.M. Junge, C. Palazuelos, Large violation of Bell inequalities with low entanglement, Comm. Math. Phys. 306 (3), (2011). W HAT WE LEARNT