Avraham Ben-Aroya (Tel Aviv University) Oded Regev (Tel Aviv University) Ronald de Wolf (CWI, Amsterdam) A Hypercontractive Inequality for Matrix-Valued.

Slides:



Advertisements
Similar presentations
1+eps-Approximate Sparse Recovery Eric Price MIT David Woodruff IBM Almaden.
Advertisements

Optimal Space Lower Bounds for All Frequency Moments David Woodruff MIT
Quantum t-designs: t-wise independence in the quantum world Andris Ambainis, Joseph Emerson IQC, University of Waterloo.
The Future (and Past) of Quantum Lower Bounds by Polynomials Scott Aaronson UC Berkeley.
QMA/qpoly PSPACE/poly: De-Merlinizing Quantum Protocols Scott Aaronson University of Waterloo.
The Equivalence of Sampling and Searching Scott Aaronson MIT.
Xiaoming Sun Tsinghua University David Woodruff MIT
Tight Lower Bounds for the Distinct Elements Problem David Woodruff MIT Joint work with Piotr Indyk.
Shortest Vector In A Lattice is NP-Hard to approximate
Approximate List- Decoding and Hardness Amplification Valentine Kabanets (SFU) joint work with Russell Impagliazzo and Ragesh Jaiswal (UCSD)
Circuit and Communication Complexity. Karchmer – Wigderson Games Given The communication game G f : Alice getss.t. f(x)=1 Bob getss.t. f(y)=0 Goal: Find.
Quantum One-Way Communication is Exponentially Stronger than Classical Communication TexPoint fonts used in EMF. Read the TexPoint manual before you delete.
Inapproximability of MAX-CUT Khot,Kindler,Mossel and O ’ Donnell Moshe Ben Nehemia June 05.
The Unique Games Conjecture with Entangled Provers is False Julia Kempe Tel Aviv University Oded Regev Tel Aviv University Ben Toner CWI, Amsterdam.
Short course on quantum computing Andris Ambainis University of Latvia.
Chain Rules for Entropy
The Rate of Concentration of the stationary distribution of a Markov Chain on the Homogenous Populations. Boris Mitavskiy and Jonathan Rowe School of Computer.
Complexity 26-1 Complexity Andrei Bulatov Interactive Proofs.
1 Introduction to Computability Theory Lecture12: Reductions Prof. Amos Israeli.
CPSC 411, Fall 2008: Set 12 1 CPSC 411 Design and Analysis of Algorithms Set 12: Undecidability Prof. Jennifer Welch Fall 2008.
1 Undecidability Andreas Klappenecker [based on slides by Prof. Welch]
Superdense coding. How much classical information in n qubits? Observe that 2 n  1 complex numbers apparently needed to describe an arbitrary n -qubit.
Oded Regev Tel-Aviv University On Lattices, Learning with Errors, Learning with Errors, Random Linear Codes, Random Linear Codes, and Cryptography and.
Oded Regev (Tel Aviv University) Ben Toner (CWI, Amsterdam) Simulating Quantum Correlations with Finite Communication.
CSEP 590tv: Quantum Computing
Quantum Algorithms II Andrew C. Yao Tsinghua University & Chinese U. of Hong Kong.
Tutorial 10 Iterative Methods and Matrix Norms. 2 In an iterative process, the k+1 step is defined via: Iterative processes Eigenvector decomposition.
Sketching and Embedding are Equivalent for Norms Alexandr Andoni (Simons Inst. / Columbia) Robert Krauthgamer (Weizmann Inst.) Ilya Razenshteyn (MIT, now.
EECS 598 Fall ’01 Quantum Cryptography Presentation By George Mathew.
1 Algorithms for Large Data Sets Ziv Bar-Yossef Lecture 13 June 22, 2005
T he Separability Problem and its Variants in Quantum Entanglement Theory Nathaniel Johnston Institute for Quantum Computing University of Waterloo.
Foundations of Cryptography Lecture 2 Lecturer: Moni Naor.
Rosen 1.6. Approaches to Proofs Membership tables (similar to truth tables) Convert to a problem in propositional logic, prove, then convert back Use.
Introduction to AEP In information theory, the asymptotic equipartition property (AEP) is the analog of the law of large numbers. This law states that.
Alice and Bob’s Excellent Adventure
Diophantine Approximation and Basis Reduction
Quantum Information, Communication and Computing Jan Kříž Department of physics, University of Hradec Králové Doppler Institute for mathematical physics.
1 Introduction to Quantum Information Processing QIC 710 / CS 667 / PH 767 / CO 681 / AM 871 Richard Cleve DC 2117 Lecture 16 (2011)
ENTROPIC CHARACTERISTICS OF QUANTUM CHANNELS AND THE ADDITIVITY PROBLEM A. S. Holevo Steklov Mathematical Institute, Moscow.
Entropy-based Bounds on Dimension Reduction in L 1 TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: A A AAAA A Oded Regev.
1 Fingerprinting techniques. 2 Is X equal to Y? = ? = ?
Information Complexity Lower Bounds for Data Streams David Woodruff IBM Almaden.
NP Complexity By Mussie Araya. What is NP Complexity? Formal Definition: NP is the set of decision problems solvable in polynomial time by a non- deterministic.
Mathematical Induction I Lecture 4: Sep 16. This Lecture Last time we have discussed different proof techniques. This time we will focus on probably the.
You Did Not Just Read This or did you?. Quantum Computing Dave Bacon Department of Computer Science & Engineering University of Washington Lecture 3:
A limit on nonlocality in any world in which communication complexity is not trivial IFT6195 Alain Tapp.
Asymmetric Communication Complexity And its implications on Cell Probe Complexity Slides by Elad Verbin Based on a paper of Peter Bro Miltersen, Noam Nisan,
Data Stream Algorithms Lower Bounds Graham Cormode
Lattice-based cryptography and quantum Oded Regev Tel-Aviv University.
Divide and Conquer. Recall Divide the problem into a number of sub-problems that are smaller instances of the same problem. Conquer the sub-problems by.
Unique Games Approximation Amit Weinstein Complexity Seminar, Fall 2006 Based on: “Near Optimal Algorithms for Unique Games" by M. Charikar, K. Makarychev,
1 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 467 / Phys 767 C&O 481 / C&O 681 Richard Cleve DC 3524 Course.
Tight Bound for the Gap Hamming Distance Problem Oded Regev Tel Aviv University TexPoint fonts used in EMF. Read the TexPoint manual before you delete.
Fidelity of a Quantum ARQ Protocol Alexei Ashikhmin Bell Labs  Classical Automatic Repeat Request (ARQ) Protocol  Quantum Automatic Repeat Request (ARQ)
Coherent Communication of Classical Messages Aram Harrow (MIT) quant-ph/
Complexity 24-1 Complexity Andrei Bulatov Interactive Proofs.
Compression for Fixed-Width Memories Ori Rottenstriech, Amit Berman, Yuval Cassuto and Isaac Keslassy Technion, Israel.
The Message Passing Communication Model David Woodruff IBM Almaden.
Analysis of Boolean Functions and Complexity Theory Economics Combinatorics …
Simulation and Design of Stabilizer Quantum Circuits Scott Aaronson and Boriska Toth CS252 Project December 10, X X +Z Z +ZI +IX
1 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 467 / Phys 767 C&O 481 / C&O 681 Richard Cleve DC 3524 Course.
Random Access Codes and a Hypercontractive Inequality for
Information Complexity Lower Bounds
Unbounded-Error Classical and Quantum Communication Complexity
Background: Lattices and the Learning-with-Errors problem
Turnstile Streaming Algorithms Might as Well Be Linear Sketches
Quantum Information Theory Introduction
Linear Systems Review Objective
Richard Cleve DC 3524 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 667 / Phys 767 C&O 481 / C&O 681 Lecture.
Presentation transcript:

Avraham Ben-Aroya (Tel Aviv University) Oded Regev (Tel Aviv University) Ronald de Wolf (CWI, Amsterdam) A Hypercontractive Inequality for Matrix-Valued Functions with Applications to Quantum Computing

Outline The new hypercontractive inequality The new hypercontractive inequality Main application: k-out-of-n random access codes Main application: k-out-of-n random access codes Another application: direct product theorem for one-way communication complexity Another application: direct product theorem for one-way communication complexity

The New Inequality

The Parallelogram Law For any two vectors a,b  R d, For any two vectors a,b  R d, Or equivalently, Or equivalently, a b a+b a-b

a b a+b a-b The Parallelogram Law This was for the  2 norm This was for the  2 norm What happens in the p norm, for 1  p<2? What happens in the p norm, for 1  p<2? The equality no longer holds, take, e.g., a=(1,0),b=(0,1) and p=1 The equality no longer holds, take, e.g., a=(1,0),b=(0,1) and p=1 But, we have the following powerful inequality for all a,b  R d and 1  p  2: But, we have the following powerful inequality for all a,b  R d and 1  p  2:

The Extended Parallelogram Law This inequality was proven by [Tomczak-Jaegermann74, BallCarlenLieb94] This inequality was proven by [Tomczak-Jaegermann74, BallCarlenLieb94] Originally used to prove the ‘sharp uniform convexity’ of p spaces Originally used to prove the ‘sharp uniform convexity’ of p spaces Implies the Bonami-Beckner hypercontractive inequality Implies the Bonami-Beckner hypercontractive inequality An extremely useful inequality in computer science (analysis of Boolean functions, hardness of approximation, learning theory, communication complexity, percolation, etc.) An extremely useful inequality in computer science (analysis of Boolean functions, hardness of approximation, learning theory, communication complexity, percolation, etc.) Recently used by [LeeNaor04] to prove a lower bound on the distortion of embeddings into 1 spaces Recently used by [LeeNaor04] to prove a lower bound on the distortion of embeddings into 1 spaces Amazingly, the same inequality also holds with a,b being matrices and norms being matrix p-norms (i.e., Schatten p- norms) Amazingly, the same inequality also holds with a,b being matrices and norms being matrix p-norms (i.e., Schatten p- norms)

Prelims: Fourier Transform Let f be a function from {0,1} n to R d (or ℂ d×d ) Let f be a function from {0,1} n to R d (or ℂ d×d ) Then we define its Fourier transform as Then we define its Fourier transform as So, e.g., So, e.g.,

The New Hypercontractive Ineq. Thm: For any vector- or matrix-valued f on {0,1} n and 1  p  2, Thm: For any vector- or matrix-valued f on {0,1} n and 1  p  2, Remark: This is the extension of the Bonami- Beckner inequality to vector/matrix-valued functions Remark: This is the extension of the Bonami- Beckner inequality to vector/matrix-valued functions

The New Hypercontractive Ineq. Thm: For any vector- or matrix-valued f on {0,1} n and 1  p  2, Thm: For any vector- or matrix-valued f on {0,1} n and 1  p  2, Proof: By induction on n. Proof: By induction on n. The case n=1 is exactly the [BCL94] inequality with a=f(0), b=f(1) The case n=1 is exactly the [BCL94] inequality with a=f(0), b=f(1) For simplicity, let’s see how to get the n=2 case. For simplicity, let’s see how to get the n=2 case. This involves four matrices, a=f(00), b=f(01), c=f(10), d=f(11) This involves four matrices, a=f(00), b=f(01), c=f(10), d=f(11)

The New Inequality (cont.) Using the case n=1 we get Using the case n=1 we get By averaging the two inequalities, we get By averaging the two inequalities, we get

The New Inequality (cont.) Using the case n=1 again, the left side is at least Using the case n=1 again, the left side is at least

Application 1: Random Access Codes Application 1: Random Access Codes

Compressing Information? Assume we are trying to store n (random) bits into n/8 bits or qubits Assume we are trying to store n (random) bits into n/8 bits or qubits Recovering all of the n original bits is ‘clearly’ impossible Recovering all of the n original bits is ‘clearly’ impossible The best success probability is obtained by storing, say, the first n/8 bits and is only 2 -  (n) The best success probability is obtained by storing, say, the first n/8 bits and is only 2 -  (n) Proving this is easy, both in the classical and quantum cases Proving this is easy, both in the classical and quantum cases 1?0????????????? nn/8

Random Access Codes But assume we wish to recover only 1 bit of the original n bits. Such a primitive is called a random access code (RAC). But assume we wish to recover only 1 bit of the original n bits. Such a primitive is called a random access code (RAC). ‘Clearly’ impossible classically… what happens quantumly? ‘Clearly’ impossible classically… what happens quantumly? More formally: More formally: A RAC is a function f:{0,1} n  R 2 n/8 mapping each x  {0,1} n to a probability distribution on n/8 bits, A RAC is a function f:{0,1} n  R 2 n/8 mapping each x  {0,1} n to a probability distribution on n/8 bits, with the property that for all i  {1,…,n} Using entropy-based arguments one can show that RACs don’t exist [AmbainisNayakTa-ShmaVazirani99, Nayak99] Using entropy-based arguments one can show that RACs don’t exist [AmbainisNayakTa-ShmaVazirani99, Nayak99] Quantum entropy behaves a lot like classical entropy, so same proof applies also for quantum RAC Quantum entropy behaves a lot like classical entropy, so same proof applies also for quantum RAC

k-out-of-n Random Access Codes Now assume we wish to recover some arbitrary k bits of x (think of k=logn) Now assume we wish to recover some arbitrary k bits of x (think of k=logn) One would expect the success probability to behave like 2 -  (k) One would expect the success probability to behave like 2 -  (k) Entropy-based arguments no longer work! Entropy-based arguments no longer work! For instance, consider the encoding that given x  {0,1} n outputs x with probability 10% and 000…0 with probability 90%. Then it has low entropy (roughly 0.1n) yet we can recover all of x prefectly with probability 10% For instance, consider the encoding that given x  {0,1} n outputs x with probability 10% and 000…0 with probability 90%. Then it has low entropy (roughly 0.1n) yet we can recover all of x prefectly with probability 10% We therefore have to use the fact that the dimension of the encoding is low (2 n/8 ) We therefore have to use the fact that the dimension of the encoding is low (2 n/8 )n/8 1?0????????????? n

k-out-of-n Random Access Codes Thm: For any k-out-of-n quantum random access code on n/8 qubits, the success probability is 2 -  (k). Remark: The classical case can be proven by ‘brute-force’ Proof: For simplicity, let’s prove the classical k=1 case For simplicity, let’s prove the classical k=1 case The quantum case is identical (using matrices instead of vectors) The quantum case is identical (using matrices instead of vectors) k>1 case is similar k>1 case is similar Recall that the RAC is described by a function Recall that the RAC is described by a function f:{0,1} n  R 2 n/8 Let us apply the inequality to f Let us apply the inequality to f

k-out-of-n Random Access Codes Since f(x) is a probability distribution, we have Since f(x) is a probability distribution, we have therefore the RHS is at most 1 The LHS is at least The LHS is at least

k-out-of-n Random Access Codes By rearranging, we get By rearranging, we get Choosing p=1+4/n yields Choosing p=1+4/n yields in contradiction.

Application 2: Communication Complexity Application 2: Communication Complexity

Direct product theorem for one-way quantum communication complexity Consider the Disjointness function: Consider the Disjointness function: Alice and Bob are each given a subset of {1,…,n} and need to decide whether their subsets are disjoint Alice and Bob are each given a subset of {1,…,n} and need to decide whether their subsets are disjoint A naïve one-way protocol requires n bits of one- way communication (Alice just sends her subset) A naïve one-way protocol requires n bits of one- way communication (Alice just sends her subset) This is essentially optimal (even quantumly) This is essentially optimal (even quantumly) We show that if Alice and Bob try to solve k independent instances of the problem with less than kn/2 (qu)bits of one-way communication, then their success probability is 2 -  (k) We show that if Alice and Bob try to solve k independent instances of the problem with less than kn/2 (qu)bits of one-way communication, then their success probability is 2 -  (k) AliceBob

Open Questions Find other applications of the inequality Find other applications of the inequality