Quantum Algorithms & Complexity

Slides:



Advertisements
Similar presentations
Quantum Computing: Whats It Good For? Scott Aaronson Computer Science Department, UC Berkeley January 10,
Advertisements

Computation, Quantum Theory, and You Scott Aaronson, UC Berkeley Qualifying Exam May 13, 2002.
Quantum Lower Bounds You probably Havent Seen Before (which doesnt imply that you dont know OF them) Scott Aaronson, UC Berkeley 9/24/2002.
Quantum Lower Bound for the Collision Problem Scott Aaronson 1/10/2002 quant-ph/ I was born at the Big Bang. Cool! We have the same birthday.
How Much Information Is In Entangled Quantum States? Scott Aaronson MIT |
Quantum Versus Classical Proofs and Advice Scott Aaronson Waterloo MIT Greg Kuperberg UC Davis | x {0,1} n ?
Quantum Software Copy-Protection Scott Aaronson (MIT) |
The Future (and Past) of Quantum Lower Bounds by Polynomials Scott Aaronson UC Berkeley.
Multilinear Formulas and Skepticism of Quantum Computing Scott Aaronson UC Berkeley IAS.
Quantum Double Feature Scott Aaronson (MIT) The Learnability of Quantum States Quantum Software Copy-Protection.
An Invitation to Quantum Complexity Theory The Study of What We Cant Do With Computers We Dont Have Scott Aaronson (MIT) QIP08, New Delhi BQP NP- complete.
New Evidence That Quantum Mechanics Is Hard to Simulate on Classical Computers Scott Aaronson Parts based on joint work with Alex Arkhipov.
How to Solve Longstanding Open Problems In Quantum Computing Using Only Fourier Analysis Scott Aaronson (MIT) For those who hate quantum: The open problems.
Arthur, Merlin, and Black-Box Groups in Quantum Computing Scott Aaronson (MIT) Or, How Laci Did Quantum Stuff Without Knowing It.
The Equivalence of Sampling and Searching Scott Aaronson MIT.
The Computational Complexity of Linear Optics Scott Aaronson and Alex Arkhipov MIT vs.
Scott Aaronson (MIT) BQP and PH A tale of two strong-willed complexity classes… A 16-year-old quest to find an oracle that separates them… A solution at.
Quantum Computing with Noninteracting Bosons
Solving Hard Problems With Light Scott Aaronson (Assoc. Prof., EECS) Joint work with Alex Arkhipov vs.
Local Hamiltonians in Quantum Computation Funding: Slovak Research and Development Agency, contract No. APVV , European Project QAP 2004-IST- FETPI-15848,
Quantum Money from Hidden Subspaces Scott Aaronson and Paul Christiano.
On Combinatorial vs Algebraic Computational Problems Boaz Barak – MSR New England Based on joint works with Benny Applebaum, Guy Kindler, David Steurer,
Uniqueness of Optimal Mod 3 Circuits for Parity Frederic Green Amitabha Roy Frederic Green Amitabha Roy Clark University Akamai Clark University Akamai.
When Exactly Do Quantum Computers Provide A Speedup?
Scott Aaronson (MIT) Forrelation A problem admitting enormous quantum speedup, which I and others have studied under various names over the years, which.
The Learning With Errors Problem Oded Regev Tel Aviv University (for more details, see the survey paper in the proceedings) Cambridge, 2010/6/11.
Umesh V. Vazirani U. C. Berkeley Quantum Algorithms: a survey.
New Lattice Based Cryptographic Constructions
Lattice-Based Cryptography. Cryptographic Hardness Assumptions Factoring is hard Discrete Log Problem is hard  Diffie-Hellman problem is hard  Decisional.
Lattice-Based Cryptography
Department of Computer Science & Engineering University of Washington
1 Quantum Computing: What’s It Good For? Scott Aaronson Computer Science Department, UC Berkeley January 10,  John.
Oded Regev Tel-Aviv University On Lattices, Learning with Errors, Learning with Errors, Random Linear Codes, Random Linear Codes, and Cryptography and.
1 Dorit Aharonov School of Computer Science and Engineering The Hebrew University, Jerusalem, Israel Israel Quantum Hamiltonian Complexity Complexity What.
Lattice-Based Cryptography
Foundations of Privacy Lecture 11 Lecturer: Moni Naor.
ON THE PROVABLE SECURITY OF HOMOMORPHIC ENCRYPTION Andrej Bogdanov Chinese University of Hong Kong Bertinoro Summer School | July 2014 based on joint work.
Scott Aaronson (MIT) Andris Ambainis (U. of Latvia) Forrelation: A Problem that Optimally Separates Quantum from Classical Computing H H H H H H f |0 
CSEP 590tv: Quantum Computing Dave Bacon Aug 3, 2005 Today’s Menu Public Key Cryptography Shor’s Algorithm Grover’s Algorithm Administrivia Quantum Mysteries:
Diophantine Approximation and Basis Reduction
1 Introduction to Quantum Information Processing QIC 710 / CS 678 / PH 767 / CO 681 / AM 871 Richard Cleve DC 2117 / QNC 3129 Lectures.
Computational Complexity Polynomial time O(n k ) input size n, k constant Tractable problems solvable in polynomial time(Opposite Intractable) Ex: sorting,
Quantum Computing and the Limits of the Efficiently Computable Scott Aaronson (MIT)
Algorithms Artur Ekert. Our golden sequence H H Circuit complexity n QUBITS B A A B B B B A # of gates (n) = size of the circuit (n) # of parallel units.
Vadim Lyubashevsky INRIA / ENS, Paris
Short course on quantum computing Andris Ambainis University of Latvia.
Quantum Factoring Michele Mosca The Fifth Canadian Summer School on Quantum Information August 3, 2005.
Search to Decision Reductions for Knapsacks and LWE 1 October 3, 2011 Daniele Micciancio, Petros Mol UCSD Theory Seminar.
Quantum Computing MAS 725 Hartmut Klauck NTU
Fast algorithm for the Shortest Vector Problem er (joint with Aggarwal, Dadush, and Stephens-Davidowitz) Oded Regev Courant Institute, NYU UC Irvine, Sloan.
Barriers in Hamiltonian Complexity Umesh V. Vazirani U.C. Berkeley.
1 Dorit Aharonov Hebrew Univ. & UC Berkeley Adiabatic Quantum Computation.
Elliptic Curves Number Theory and Cryptography. A Pile of Cannonballs A Square of Cannonballs.
Lattice-based cryptography and quantum Oded Regev Tel-Aviv University.
CRYPTOGRAPHY AND NP-HARDNESS Andrej Bogdanov Chinese University of Hong Kong MACS Foundations of Cryptography| January 2016.
Capabilities and limitations of quantum computers Michele Mosca 1 November 1999 ECC ’99.
Quantum algorithms are at most polynomially faster for any symmetric function Andris Ambainis University of Latvia.
Quantum Computation Stephen Jordan. Church-Turing Thesis ● Weak Form: Anything we would regard as “computable” can be computed by a Turing machine. ●
Topic 26: Discrete LOG Applications
On the Size of Pairing-based Non-interactive Arguments
Scott Aaronson (MIT) QIP08, New Delhi
Cryptographic protocols 2014, Lecture 2 assumptions and reductions
The Learning With Errors Problem
Background: Lattices and the Learning-with-Errors problem
2nd Lecture: QMA & The local Hamiltonian problem
Quantum Computing: What’s It Good For?
3rd Lecture: QMA & The local Hamiltonian problem (CNT’D)
Quantum Computation and Information Chap 1 Intro and Overview: p 28-58
Classical Algorithms from Quantum and Arthur-Merlin Communication Protocols Lijie Chen MIT Ruosong Wang CMU.
On The Quantitative Hardness of the Closest Vector Problem
Presentation transcript:

Quantum Algorithms & Complexity Umesh Vazirani U.C. Berkeley

One does not, by knowing all the physical laws as we know them today, immediately obtain an understanding of anything much. (Richard Feynman, 1918-1988)

One does not, by knowing all the physical laws as we know them today, immediately obtain an understanding of anything much. (Richard Feynman, 1918-1988) Quantum computers are the only known model of Computation that violate the Extended Church-Turing thesis.

Goals of Quantum Algorithms/Complexity Find exponential speedups for a range of natural computational problems. Establish the limits of quantum algorithms. Relate quantum complexity classes, such as BQP and QMA, to classical complexity classes, such as BPP, MA, PH.

Goals of Quantum Algorithms/Complexity Find exponential speedups for a range of natural computational problems. Establish the limits of quantum algorithms. Relate quantum complexity classes, such as BQP and QMA, to classical complexity classes, such as BPP, MA, PH. Far reaching implications for cryptography, computational complexity, physics, … Each of these gives its own unique flavor to the questions.

Quantum resistant cryptography Quantum computers break much of modern cryptography. RSA (factoring), Diffie-Helman (discrete log), Elliptic curve crypto, Buchmann-Williams (Pell eqn)… Suppose we had a classical cryptosystem that was as efficient and convenient as RSA, but was provably not breakable even on a quantum computer. Then there would be an incentive to switch to the new cryptosystem, well before a large scale quantum computer were experimentally realized.

Suppose we had a very efficient classical cryptosystem that we believed was quantum resistant. What kind of evidence could we present to “prove” it? (Don’t have a working quantum computer to run heuristics) The answer relies crucially on our understanding of the power and limitations of quantum computers.

Hidden Subgroup Problem G finite group. H subgroup of G. Given black box that evaluates f: G -> S: f is constant on cosets of H. Determine H. G: G abelian: lens = fourier transform over G. polynomial time quantum algorithm. Shor: factoring. G = ZN. Period finding. discrete log. G = Zp x Zp [Hallgren] Pell’s equation [van Dam, Hallgren, Ip] Hidden shift problems, Breaking homomorphic encryption [van Dam, Seroussi] Gauss sums

Quantum Algorithm for Abelian HSP Random coset state: use f to set up state G: gH = FT over G FT over G: FT + measurement gives uniformly random element of Think of this as a random linear constraint on H …

Non-abelian hidden subgroup problem Lens = (non-abelian) fourier transform over G. Graph Isomorphism SN Symmetric group Short vector in Lattice: Finding short vector not easy! [Regev] DN Dihedral group

Lattice Problems Finding short lattice vectors closely related to Dihedral HSP. Random coset state preparation + Fourier sampling gives sufficient info to reconstruct subgroup. But classically reconstructing subgroup appears to be very difficult. Related to subset sum. Kuperberg’s quantum reconstruction algorithm.

Public-key cryptosystems based on Quantum hardness of Shortest Lattice Vector. [Ajtai-Dwork] cryptosystem. [Regev] Improved efficiency based on assumption that finding short lattice vectors is hard for quantum algorithms. New cryptosystem resembles hardness of solving noisy linear equations mod p. Worst-case to average case reduction.

Learning with errors Linear equations in n variables over Zp for p prime, where n2 < p < 2n2 m noisy equations: where and is gaussian with mean 0 and standard deviation n1.5 Theorem [Regev]: LWE is as hard as approximating the shortest vector in a lattice to within n1.5

Worst-case to average-case reduction LWE specifies an average-case problem. Inputs sampled from a fixed distribution. Quantum reduction showing that an arbitrary lattice problem (worst-case) can be mapped to LWE. Example of the quantum method. Prove a purely classical statement by quantum methods. [Kerenidis, deWolf] lower bounds for locally decodable codes.

LWE and Lattices Lattice L = {integer linear combinations of u1, …, un } Dual lattice L* = {v: <v,u> integer for all u in L} L* is the fourier transform of L.

LWE and Lattices Lattice L = {integer linear combinations of u1, …, un } Dual lattice L* = {v: <v,u> integer for all u in L} L* is the fourier transform of L. D*L DL

DL D*L Sampling from DL with small width Gaussian implies good approximation of shortest lattice vector. Polynomially large samples from DL yield an unbiased estimator for D*L . If the width of the Gaussian is large, this gives a way of, given x, approximating the closest lattice vector to x in L*. Quantum reduction, given algorithm for approximating closest vector in L*, to sampling from DL .

Quantum reduction, given algorithm for approximating DL D*L Sampling from DL with small width Gaussian implies good approximation of shortest lattice vector. Polynomially large samples from DL yield an unbiased estimator for D*L . If the width of the Gaussian is large, this gives a way of, given z, approximating the closest lattice to z. Quantum reduction, given algorithm for approximating closest vector in L*, to sampling from DL . To erase x, compute x given z=x+y:

Improving the Efficiency Based on cyclic lattices: Lattices where the basis consists of vector v, and all its cyclic shifts. Much more succinct. Key size n2 -> n Faster computation – use Fourier transforms. [Piekart, Rosen] collision resistant hash functions. [Gentry] Homomorphic encryption.

Open Questions Is there a quantum algorithm to find a short vector in a cyclic lattice? Does the van Dam, Hallgren, Ip quantum algorithm for breaking homomorphic encryption extend to Gentry’s scheme? Is it possible to speed up Kuperberg’s quantum reconstruction algorithm for the dihedral HSP? Is it possible to design a public-key cryptosystem based on cyclic lattices?

Greater Security? [Hallgren, Moore, Roettler, Russell, Sen 06] provide very strong evidence of quantum hardness: Hg1 Hg2 Hgk k < poly(n) implies exponentially many measurements For sufficiently non-abelian groups. Eg Sn, GLn in particular: graph isomorphism. Sufficiently non-abelian ~ exponential sized irreps + … Can one base public-key cryptography on these stronger impossibility results? [Moore, Russell, V] One-way function, related to McEliese Cryptosystem, based on hardness of HSP over

Goals of Quantum Algorithms/Complexity Find exponential speedups for a range of natural computational problems. Establish the limits of quantum algorithms. Relate quantum complexity classes, such as BQP and QMA, to classical complexity classes, such as BPP, MA, PH.

An Old Question in Quantum Complexity Theory Is BQP C PH? [Bernstein, V ‘93] There is an oracle A: BQPA C MAA Conjectured that same holds for PH – that recursive fourier sampling is in BQP but not in PH. [Aaronson ‘09] Conjecture: Fourier checking is in BQP, but not in PH. Proof that this is true under the generalized Linial-Nisan conjecture. The original Linial-Nisan conjecture states that logn-wise independent distributions fool AC0 circuits. Resolved by Braverman. Generalized = almost logn-wise.

Hamiltonian Complexity Computational complexity <--> condensed matter physics H = H1 + … + Hm , each Hi k-local. [Kitaev] Computing ground energy of H is QMA-hard. [Aharonov, et. al.] Adiabatic quantum computation is universal. [Hastings] Area law for 1-D local Hamiltonians. Efficient simulation of gapped Hamiltonians. [Aharonov, Gottesman, Irani, Kempe] Computing ground states of 1-D local Hamiltonians QMA-hard.

Quantum PCP theorem? Given a promise that k-local hamiltonian H has either ground energy 0 or cm for constant c, determine which. Classical PCP theorem is a cornerstone of classical complexity theory. Theory of inapproximability, room temperature QC [Aharonov, Arad, Landau, V] quantum gap amplification.

How do you verify a theory where you require exponential resources to calculate the predicted outcome of the experiment? One-way function. Start with P, Q primes. Multiply N = PQ. See if quantum computer can Factor. How do you verify the claims of a company New-Wave, that claims to have built a quantum Computer? [Aharonov, et. Al.], [Broadbent, et. Al.] Quantum interactive proofs.

Conclusions Quantum algorithms and complexity theory explore fundamental questions with profound implications: Quantum resistant cryptography. Probabilistic method <--> quantum method Quantum complexity <--> classical complexity quantum complexity theory <--> condensed matter physics Verifying quantum computations.