Quantum algorithms are at most polynomially faster for any symmetric function Andris Ambainis University of Latvia.

Slides:



Advertisements
Similar presentations
Computation, Quantum Theory, and You Scott Aaronson, UC Berkeley Qualifying Exam May 13, 2002.
Advertisements

Quantum Lower Bounds You probably Havent Seen Before (which doesnt imply that you dont know OF them) Scott Aaronson, UC Berkeley 9/24/2002.
Quantum Lower Bound for the Collision Problem Scott Aaronson 1/10/2002 quant-ph/ I was born at the Big Bang. Cool! We have the same birthday.
Quantum Lower Bounds The Polynomial and Adversary Methods Scott Aaronson September 14, 2001 Prelim Exam Talk.
Quantum t-designs: t-wise independence in the quantum world Andris Ambainis, Joseph Emerson IQC, University of Waterloo.
Quantum Versus Classical Proofs and Advice Scott Aaronson Waterloo MIT Greg Kuperberg UC Davis | x {0,1} n ?
Quantum Software Copy-Protection Scott Aaronson (MIT) |
The Future (and Past) of Quantum Lower Bounds by Polynomials Scott Aaronson UC Berkeley.
SPEED LIMIT n Quantum Lower Bounds Scott Aaronson (UC Berkeley) August 29, 2002.
Lower Bounds for Local Search by Quantum Arguments Scott Aaronson.
Limitations of Quantum Advice and One-Way Communication Scott Aaronson UC Berkeley IAS Useful?
Lower Bounds for Local Search by Quantum Arguments Scott Aaronson (UC Berkeley) August 14, 2003.
How to Solve Longstanding Open Problems In Quantum Computing Using Only Fourier Analysis Scott Aaronson (MIT) For those who hate quantum: The open problems.
The Collision Lower Bound After 12 Years Scott Aaronson (MIT) Lower bound for a collision problem.
On the degree of symmetric functions on the Boolean cube Joint work with Amir Shpilka.
Many-to-one Trapdoor Functions and their Relations to Public-key Cryptosystems M. Bellare S. Halevi A. Saha S. Vadhan.
Random non-local games Andris Ambainis, Artūrs Bačkurs, Kaspars Balodis, Dmitry Kravchenko, Juris Smotrovs, Madars Virza University of Latvia.
Uniqueness of Optimal Mod 3 Circuits for Parity Frederic Green Amitabha Roy Frederic Green Amitabha Roy Clark University Akamai Clark University Akamai.
 The running time of an algorithm as input size approaches infinity is called the asymptotic running time  We study different notations for asymptotic.
Scott Aaronson (MIT) Forrelation A problem admitting enormous quantum speedup, which I and others have studied under various names over the years, which.
Foundations of Cryptography Lecture 5 Lecturer: Moni Naor.
Computability and Complexity
UMass Lowell Computer Science Analysis of Algorithms Spring, 2002 Chapter 5 Lecture Randomized Algorithms Sections 5.1 – 5.3 source: textbook.
The Growth of Functions
Asymptotic Growth Rate
Limitations of VCG-Based Mechanisms Shahar Dobzinski Joint work with Noam Nisan.
Lecturer: Moni Naor Foundations of Cryptography Lecture 4: One-time Signatures, UOWHFs.
Department of Computer Science & Engineering University of Washington
Lower Bounds for Collision and Distinctness with Small Range By: Andris Ambainis {medv, Mar 17, 2004.
Complexity 19-1 Complexity Andrei Bulatov More Probabilistic Algorithms.
1 Sampling Lower Bounds via Information Theory Ziv Bar-Yossef IBM Almaden.
מבנה המחשב + מבוא למחשבים ספרתיים תרגול 5# Topics: 1.Encoders and decoders 2.Shifters.
Quantum Algorithms II Andrew C. Yao Tsinghua University & Chinese U. of Hong Kong.
Lecture 20: April 12 Introduction to Randomized Algorithms and the Probabilistic Method.
DAST 2005 Week 4 – Some Helpful Material Randomized Quick Sort & Lower bound & General remarks…
Monadic Predicate Logic is Decidable Boolos et al, Computability and Logic (textbook, 4 th Ed.)
Scott Aaronson (MIT) Andris Ambainis (U. of Latvia) Forrelation: A Problem that Optimally Separates Quantum from Classical Computing H H H H H H f |0 
On Everlasting Security in the Hybrid Bounded Storage Model Danny Harnik Moni Naor.
IT University of Copenhagen Lecture 8: Binary Decision Diagrams 1. Classical Boolean expression representations 2. If-then-else Normal Form (INF) 3. Binary.
Simon’s Algorithm Arathi Ramani EECS 598 Class Presentation.
Correlation testing for affine invariant properties on Shachar Lovett Institute for Advanced Study Joint with Hamed Hatami (McGill)
1 Introduction to Quantum Information Processing QIC 710 / CS 678 / PH 767 / CO 681 / AM 871 Richard Cleve DC 2117 / QNC 3129 Lectures.
New quantum lower bound method, with applications to direct product theorems Andris Ambainis, U. Waterloo Robert Spalek, CWI, Amsterdam Ronald de Wolf,
Quantum Computing MAS 725 Hartmut Klauck NTU TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: A A A A.
Ran El-Yaniv and Dmitry Pechyony Technion – Israel Institute of Technology, Haifa, Israel Transductive Rademacher Complexity and its Applications.
Algorithms Artur Ekert. Our golden sequence H H Circuit complexity n QUBITS B A A B B B B A # of gates (n) = size of the circuit (n) # of parallel units.
PRIMES is in P Manindra Agrawal NUS Singapore / IIT Kanpur.
Quantum Computing MAS 725 Hartmut Klauck NTU
Quantum random walks – new method for designing quantum algorithms Andris Ambainis University of Latvia.
Alternative Wide Block Encryption For Discussion Only.
Quantum random walks and quantum algorithms Andris Ambainis University of Latvia.
Quantum algorithms vs. polynomials and the maximum quantum-classical gap in the query model.
Scott Aaronson (MIT) ThinkQ conference, IBM, Dec. 2, 2015 The Largest Possible Quantum Speedups H H H H H H f |0  g H H H.
Exact quantum algorithms Andris Ambainis University of Latvia.
Forrelation: A Problem that Optimally Separates Quantum from Classical Computing.
CRYPTOGRAPHY AND NP-HARDNESS Andrej Bogdanov Chinese University of Hong Kong MACS Foundations of Cryptography| January 2016.
Equivalence Relations Lecture 45 Section 10.3 Fri, Apr 8, 2005.
The Message Passing Communication Model David Woodruff IBM Almaden.
Theory of Computational Complexity Probability and Computing Ryosuke Sasanuma Iwama and Ito lab M1.
Quantum Algorithms Oracles
Richard Cleve DC 2117 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 667 / Phys 767 C&O 481 / C&O 681 Lecture.
Quantum algorithms for evaluating Boolean formulas
Introduction to Randomized Algorithms and the Probabilistic Method
On the Size of Pairing-based Non-interactive Arguments
Depth Estimation via Sampling
An Upper Bound on the GKS Game via Max Bipartite Matching
Topic 3: Prob. Analysis Randomized Alg.
Classical Algorithms from Quantum and Arthur-Merlin Communication Protocols Lijie Chen MIT Ruosong Wang CMU.
Introduction to Quantum Information Processing CS 467 / CS 667 Phys 467 / Phys 767 C&O 481 / C&O 681 Lecture 4 (2005) Richard Cleve DC 653
Quantum Lower Bounds Via Laurent Polynomials
Presentation transcript:

Quantum algorithms are at most polynomially faster for any symmetric function Andris Ambainis University of Latvia

When does a problem have exponential speedups? What properties are necessary/sufficient?

Simon’s problem Black box F:{0, 1} n  {0, 1} n. Hidden y  {0, 1} n. F(x) = F(z) if and only if z = x  y. Goal: find y. Classical: O(2 n/2 ) evaluations of f. Quantum: O(n) evaluations of f.

Decision version of Simon’s problem Black box F:{0, 1} n  {0, 1} n. One of two cases: –F(x) = F(z) if and only if z = x  y. –F(x) are all distinct. Determine which of two cases we have. Classical: O(2 n/2 ) evaluations of f. Quantum: O(n) evaluations of f.

Collision problem Black box F:{0, 1} n  {0, 1} n. One of two cases: –For each x, there is unique z≠x: F(x) = F(z). –F(x) are all distinct. Determine which of two cases we have. Classical: O(2 n/2 ) evaluations of f. Quantum: O(2 n/3 ) evaluations of f.

Simon’s problem Simon’s problem: –F(x) = F(z) if and only if z = x  y. –F(x) are all distinct. Which of those two? Collision problem: –For each x, there is unique z≠x: F(x) = F(z). –F(x) are all distinct. Which of those two? Permuting F(x) transforms Simon’s into the collision problem.

Folk conjecture Conjecture If G – symmetric (e.g., the collision problem), then the quantum complexity of G at most polynomially smaller than the classical complexity of G.

Terminology F:{1,..., N}  {1,..., M}. Property G(F)=G(F(1),..., F(N)). Define x i = F(i). G(x 1, x 2,..., x N )– function of N variables x 1, x 2,..., x N  {1,..., M}. Evaluations F(i) = queries about x i.

Two types of symmetries Function G is symmetric if G(x 1,..., X N ) = G(xx G(x 1,..., X N ) = G(x  (1),..., x  (N) ) = G(  (x 1 ),...,  (x N )). Q  i  (i) x  (i)  Q ixixi  (x i ) Q ixixi

Main result Theorem If G has both types of symmetries, R 2 (G)=O*(Q 2 11 (G)), where –R 2 (G) is the number of queries to compute G by a probabilistic algorithm; –Q 2 (G) is the number of queries to compute G by a probabilistic algorithm. * some log factors are omitted.

Previous results [Beals et al., 1998] If f(x 1,..., x N ),x 1,..., x N  {0, 1} is total (defined for all x 1,..., x N ), then D(f)=O(Q 2 6 (f)). Incomparable to our result: –[Beals et al.]: total, possibly non-symmetric. –Our result: symmetric, possibly not total.

Proof of main result Theorem R 2 (G)=O*(Q 2 11 (G)). For simplicity, prove R 2 (G)=O*(Q 2 14 (G)). 1. Probabilistic strategy with T 2 queries; 2. If the probabilistic strategy fails, we deduce a quantum lower bound of Ω(T 1/7 ).

Input types Since G(x 1,..., x N ) is symmetric, it only depends on:... the number of i:x i =1 the number of i:x i =2 the number of i:x i =3 y1y1 y2y2 y3y3... Input type

Random sampling Input type (y 1,..., y M ). Query x i for T 2 randomly chosen indices i. Estimate y 1,..., y M based on results. With high probability, the estimates y’ i are within O(N/T) of the actual y i.

Two cases Estimates (y’ 1,... y’ M ). Assume all y’ i are within O(N/T) of true y i. Case 1 This assumption uniquely determines G(y 1,..., y M ). Case 2 We have G(y 1,..., y M )=0, G(y 1 ’’,..., y M ’’)=1, both consistent with the assumption.

Distinguishing problem y1y1 y2y2 y3y3... y’’ 1 y’’ 2 y’’ 3... y i and y’’ i differ by at most O(N/T). G=0G=1 Claim Distinguishing between these two types requires Ω(T 1/7 ) queries.

Case 1 y1y1 y2y2 y3y3... y’’ 1 y’’ 2 y’’ 3... G=0G=1 Total difference: If D small, the types are hard to distinguish.

Case 1 Theorem Ifis O(N/ε), then Ω(1/√ ε) queries are needed to distinguish between y i and y’’ i. Proof: quantum adversary [A, 2000].

Case 2 y1y1 y2y2 y3y3... y’’ 1 y’’ 2 y’’ 3... G=0G=1 ε. more than N/ ε. Each difference at most O(N/T). ε different rows. At least T/ε different rows.

Simplifying assumption y1y1 y2y2 y3y3... y’’ 1 y’’ 2 y’’ 3... G=0G=1. Every two rows differ by 0 or k. Lemma Under this assumption, Ω(m 1/5 ) queries are needed, m – number of. Different rows.

Intermediate input type y1y1 y2y2 y3y3... y’’ 1 y’’ 2 y’’ 3... G=0 G=1 z1z1 z2z2 z3z Require Ω(m 1/5 ) queries to distinguish. Require Ω(m 1/5 ) queries to distinguish.

SImplifying.... y1y1 y2y2 y3y3... G=0 z1z1 z2z2 z3z For simplicity, remove all equal rows.

Simplifying... ymym... zmzm 0 0 y1y1 z1z1 Distinguishing these requires Ω(m 1/5 ) queries!

Set equality Variables x 1,..., x m, x’ 1,..., x’ m. Promise: {x 1,..., x m } and {x’ 1,..., x’ m } are either equal or disjoint. Task: distinguish the two cases. Theorem [Midrijānis, 2004] Set equality requires Theorem [Midrijānis, 2004] Set equality requires Ω(m 1/5 ) queries.

Set equality ≤ Distinguishing ymym... zmzm 0 0 y1y1 z1z1 Replicate:  x 1,... x m - z 1,..., z m times;  x’ 1,... x’ m - k times each. Are {x 1,... X m } and {x’ 1,... x’ m } equal or disjoint?

Putting it all together If m ≥ T 5/7, then the lower bound of Ω(m 1/5 ) = Ω(T 1/7 ) Ω(m 1/5 ) = Ω(T 1/7 ) follows from set equality. Otherwise, each row differs by O(N/T). The total difference at most By the other argument, Ω(T 1/7 ) queries needed.

More information? A. Ambainis, arxiv preprint 0902.xxxx.

Open problems 1. Improve the exponent 11 in R 2 (G)=O*(Q 2 11 (G)). 2. Prove better lower bound for set equality (the best algorithm is O(m 1/3 ). 3. Prove R 2 (G)=O(Q 2 c (G)) for functions G(x 1,..., x N ) that are only symmetric w. r. t. permuting x 1,..., x N.

SImplifying the problem... Y Y’’ Y1Y1 Y2Y2 Y3Y3