Introduction to Quantum Information Processing CS 667 / Phys 767 / C&O 681 Lecture 15 (2008) Richard Cleve DC 2117 [email protected] 1 Continuous-time evolution 2 Continuous-time evolution Although we’ve expressed quantum operations in discrete terms, in real physical systems, the evolution is continuous Let H be any Hermitian matrix and t R 1 Then eiHt is unitary – why? λ1 † D H = U DU, where λd e iλ1t t † iDt iHt Therefore e = U e U = U 0 (unitary) U e iλd t 3 Grover’s quantum search algorithm 4 Quantum search problem Given: a black box computing f : {0,1}n {0,1} Goal: determine if f is satisfiable (if x {0,1}n s.t. f(x) = 1) In positive instances, it makes sense to also find such a satisfying assignment x Classically, using probabilistic procedures, order 2n queries are necessary to succeed—even with probability ¾ (say) Grover’s quantum algorithm that makes only O(2n) queries Query: x1 [Grover ’96] xn y x1 Uf xn y f(x1,...,xn) 5 Applications of quantum search The function f could be realized as a 3-CNF formula: f x1 ,..., xn x1 x3 x4 x2 x3 x5 x1 x5 xn PSPACE Alternatively, the search could be for a certificate for any problem in NP The resulting quantum algorithms appear to be quadratically more efficient than the best classical algorithms known 3-CNF-SAT NP co-NP FACTORING P 6 Prelude to Grover’s algorithm: two reflections = a rotation Consider two lines with intersection angle : reflection 2 2 2 1 1 reflection 1 Net effect: rotation by angle 2, regardless of starting vector 7 Grover’s algorithm: description I Basic operations used: x1 x n y x1 Uf x1 x n y xn y f(x1,...,xn) x1 U0 H Uf x = (1) f(x) x xn y [x = 0...0] Hadamard Implementation? X X X X X X U0 x = (1) [x = 0...0]x H H H 8 Grover’s algorithm: description II iteration 1 iteration 2 ... H H 0 0 H Uf H U0 H Uf U0 1. construct state H 0...0 2. repeat k times: apply H U0 HUf to state 3. measure state, to get x{0,1}n, and check if f(x) =1 (The setting of k will be determined later) 9 Grover’s algorithm: analysis I Let A = {x {0,1}n : f (x) = 1} and B = {x {0,1}n : f (x) = 0} and N = 2n and a = |A| and b = |B| Let A a 1 x x b B and 1 xA xB Consider the space spanned by A and B A goal is to get close to this state H0...0 B 1 N x a N A b N B x{ 0 ,1} n Interesting case: a << N 10 Grover’s algorithm: analysis II A Algorithm: (HU0 HUf )k H 0...0 H0...0 B Observation: Uf is a reflection about B: Uf A = A and Uf B = B Question: what is HU0 H ? U0 is a reflection about H0...0 Partial proof: H U0 HH0...0 = H U0 0...0 = H( 0...0) = H 0...0 11 Grover’s algorithm: analysis III A 2 Algorithm: (HU0 HUf )k H 0...0 2 2 2 H0...0 B Since H U0 HUf is a composition of two reflections, it is a rotation by 2, where sin()=a/N a/N When a = 1, we want (2k+1)(1/N) /2 , so k (/4)N More generally, it suffices to set k (/4)N/a Question: what if a is not known in advance? 12 Introduction to Quantum Information Processing CS 667 / Phys 767 / C&O 681 Lecture 17 (2008) Richard Cleve DC 2117 [email protected] 13 Optimality of Grover’s algorithm 14 Optimality of Grover’s algorithm Theorem: any quantum search algorithm for f : {0,1}n {0,1} must make (2n) queries to f (if f is used as a black-box) Proof (of a slightly simplified version): Assume queries are of the form |x (1) f(x)|x f and that a k-query algorithm is of the form |0...0 U0 f U1 f U2 f U3 f where U0, U1, U2, ..., Uk, are arbitrary unitary operations Uk 15 Optimality of Grover’s algorithm Define fr : {0,1}n {0,1} as fr (x) = 1 iff x = r Consider |0 U0 fr U1 fr U2 fr U3 fr Uk |ψr,k I U1 I U2 I U3 I Uk |ψr,0 versus |0 U0 We’ll show that, averaging over all r {0,1}n, || |ψr,k |ψr,0 || 2k / 2n 16 Optimality of Grover’s algorithm Consider |0 U0 I U1 ki I U2 fr U3 fr Uk |ψr,i i Note that |ψr,k |ψr,0 = (|ψr,k |ψr,k1) + (|ψr,k1 |ψr,k2) + ... + (|ψr,1 |ψr,0) which implies || |ψr,k |ψr,0 || || |ψr,k |ψr,k1 || + ... + || |ψr,1 |ψr,0 || 17 Optimality of Grover’s algorithm query |0 U0 I U1 U0 I U1 query i+1 I query |0 i fr U2 i U3 |ψr,i fr Uk fr Uk |ψr,i-1 query i+1 I I U2 α i ,x U3 x x || |ψr,i |ψr,i-1 || = |2i,r|, since query only negates |r Therefore, || |ψr,k |ψr,0 || k 1 2α i 0 i ,r 18 Optimality of Grover’s algorithm Now, averaging over all r {0,1}n, 1 2n r ψ r ,k ψ r ,0 1 n 2 k 1 2 α i ,r r i 0 1 n 2 2 α i ,r i 0 r 1 n 2 k 1 k 1 n 2 2 i 0 (By Cauchy-Schwarz) 2k 2n Therefore, for some r {0,1}n, the number of queries k must be (2n), in order to distinguish fr from the all-zero function This completes the proof 19 Introduction to Quantum Information Processing CS 667 / Phys 767 / C&O 681 Lecture 18 (2008) Richard Cleve DC 2117 [email protected] 20 Lab tour (instead of a regular lecture) 21 Introduction to Quantum Information Processing CS 667 / Phys 767 / C&O 681 Lecture 19 (2008) Richard Cleve DC 2117 [email protected] 22 Preliminary remarks about quantum communication 23 Quantum information can apparently be used to substantially reduce computation costs for a number of interesting problems How does quantum information affect the communication costs of information processing tasks? We explore this issue ... 24 Entanglement and signaling Recall that Entangled states, such as qubit 1 2 00 1 2 11 , qubit can be used to perform some intriguing feats, such as teleportation and superdense coding —but they cannot be used to “signal instantaneously” Any operation performed on one system has no affect on the state of the other system (its reduced density matrix) 25 Basic communication scenario Goal: convey n bits from Alice to Bob x1x2 xn Alice Resources Bob x1x2 xn 26 Basic communication scenario Bit communication: Cost: n Cost: Bit communication & prior entanglement: Cost: n Qubit communication: (can be deduced) n [Holevo’s Theorem, 1973] Qubit communication & prior entanglement: Cost: n/2 superdense coding [Bennett & Wiesner, 1992] 27 The GHZ “paradox” 28 GHZ scenario [Greenberger, Horne, Zeilinger, 1980] Input: Output: r s t a ←r b ← ¬s c ←1 Alice Rules of the game: 1. It is promised that Bob r s t = 0 Carol rst abc abc 2. No communication after inputs received 000 0 011 3. They win if abc = rst 011 1 001 101 1 111 110 1 101 29 No perfect strategy for GHZ Input: r s t Output: a b c rst abc 000 0 011 1 101 1 110 1 General deterministic strategy: a0, a1, b0, b1, c0, c1 Winning conditions: a0 b0 c0 = 0 Has no solution, a0 b1 c1 = 1 thus no perfect a1 b0 c1 = 1 strategy exists a1 b1 c0 = 1 30 GHZ: preventing communication Input: r s t Output: a b c Input and output events can be space-like separated: so signals at the speed of light are not fast enough for cheating What if Alice, Bob, and Carol still keep on winning? 31 “GHZ Paradox” explained Prior entanglement: = 000 – 011 – 101 – 110 r s t a b c Alice’s strategy: 1. if r = 1 then apply H to qubit 2. measure qubit and set a to result 1 1 H 2 1 1 1 Bob’s & Carol’s strategies: similar Case 2 1 (rst = 011): 000): new statestate is measured 001 + 010 directly – 100 … + 111 Cases 3 & 4 (rst = 101 & 110): similar by symmetry 32 GHZ: conclusions • For the GHZ game, any classical team succeeds with probability at most ¾ • Allowing the players to communicate would enable them to succeed with probability 1 • Entanglement cannot be used to communicate • Nevertheless, allowing the players to have entanglement enables them to succeed with probability 1 • Thus, entanglement is a useful resource for the task of winning the GHZ game 33 The Bell inequality and its violation – Physicist’s perspective 34 Bell’s Inequality and its violation Part I: physicist’s view: Can a quantum state have pre-determined outcomes for each possible measurement that can be applied to it? qubit: where the “manuscript” is something like this: if {0,1} measurement then output 0 if {+,−} measurement then output 1 if ... (etc) called hidden variables [Bell, 1964] [Clauser, Horne, Shimony, Holt, 1969] table could be implicitly given by some formula 35 Bell Inequality Imagine a two-qubit system, where one of two measurements, called M0 and M1, will be applied to each qubit: M0 : a0 M1 : a1 Define: A0 = (1)a0 A1 = (1)a1 B0 = (1)b0 B1 = (1)b1 space-like separated, so no cross-coordination M0 : b0 M1 : b1 Claim: A0 B0 + A0 B1 + A1B0 A1 B1 2 Proof: A0 (B0 + B1) + A1 (B0 B1) 2 one is 2 and the other is 0 36 Bell Inequality A0 B0 + A0 B1 + A1B0 A1 B1 2 is called a Bell Inequality* Question: could one, in principle, design an experiment to check if this Bell Inequality holds for a particular system? Answer 1: no, not directly, because A0, A1, B0, B1 cannot all be measured (only one As Bt term can be measured) Answer 2: yes, indirectly, by making many runs of this experiment: pick a random st {00, 01, 10, 11} and then measure with Ms and Mt to get the value of As Bt The average of A0 B0, A0 B1, A1B0, A1 B1 should be ½ * also called CHSH Inequality 37 Introduction to Quantum Information Processing CS 667 / Phys 767 / C&O 681 Lecture 20 (2008) Richard Cleve DC 2117 [email protected] 38 Violating the Bell Inequality Two-qubit system in state = 00 – 11 Applying rotations A and B yields: cos(A + B ) (00 – 11) + sin(A + B ) (01 + 10) A B = +1 Define M0: rotate by /16 then measure M1: rotate by +3/16 then measure Then A0 B0, A0 B1, A1B0, A1 B1 all have expected value ½√2, which contradicts the upper bound of ½ A B = 1 st = 11 3/8 st = 01 or 10 /8 -/8 st = 00 cos2(/8) = ½ + ¼√2 39 Bell Inequality violation: summary Assuming that quantum systems are governed by local hidden variables leads to the Bell inequality A0 B0 + A0 B1 + A1B0 A1 B1 2 But this is violated in the case of Bell states (by a factor of √2) Therefore, no such hidden variables exist This is, in principle, experimentally verifiable, and experiments along these lines have actually been conducted 40 The Bell inequality and its violation – Computer Scientist’s perspective 41 Bell’s Inequality and its violation Part II: computer scientist’s view: s input: output: a t b Rules: 1. No communication after inputs received 2. They win if ab = st With classical resources, Pr[ab = st] ≤ 0.75 But, with prior entanglement state 00 – 11, Pr[ab = st] = cos2(/8) = ½ + ¼√2 = 0.853… st ab 00 0 01 0 10 0 11 1 42 The quantum strategy • Alice and Bob start with entanglement = 00 – 11 • Alice: if s = 0 then rotate by A = /16 else rotate by A = + 3/16 and measure • Bob: if t = 0 then rotate by B = /16 else rotate by B = + 3/16 and measure st = 11 3/8 st = 01 or 10 /8 -/8 st = 00 cos(A – B ) (00 – 11) + sin(A – B ) (01 + 10) Success probability: Pr[ab = st] = cos2(/8) = ½ + ¼√2 = 0.853… 43 Nonlocality in operational terms information processing task ! classically, communication is needed quantum entanglement 44 The magic square game 45 Magic square game Problem: fill in the matrix with bits such that each row has even parity and each column has odd parity a11 a12 a13 a21 a22 a23 even a31 a32 a33 even even odd odd odd Game: ask Alice to fill in one row and Bob to fill in one column They win iff parities are correct and bits agree at intersection Success probabilities: [Aravind, 2002] 8/9 classical and 1 quantum (details omitted here) 46 Preview of communication complexity 47 Classical Communication Complexity [Yao, 1979] x1x2 xn y1y2 yn f (x,y) E.g. equality function: f (x,y) = 1 if x = y, and 0 if x y Any deterministic protocol requires n bits communication Probabilistic protocols can solve with only O(log(n/)) bits communication (error probability ) 48 Quantum Communication Complexity x1 x2 xn y1 y2 yn Qubit communication qubits Prior entanglement entangled qubits x1 x2 xn f (x,y) y1 y2 yn bits f (x,y) Question: can quantum beast classical in this context? 49 Appointment scheduling 1 2 3 4 5 ... n x= 01101…0 1 2 3 4 5 ... n y= 10011…1 i (xi = yi = 1) Classically, (n) bits necessary to succeed with prob. 3/4 For all > 0, O(n1/2 log n) qubits sufficient for error prob. < [KS ‘87] [BCW ‘98] 50 Search problem 1 Given: 2 3 4 5 6 ... n x= 000010…1 log n i 1 b b x accessible via queries i b b xi Goal: find i{1, 2, …, n} such that xi = 1 Classically: (n) queries are necessary Quantum mechanically: O(n1/2) queries are sufficient [Grover, 1996] 51 1 2 3 4 5 6 ... n Alice x= 011010…0 Bob y= 100110…1 xy = 0 0 0 0 1 0 … 0 i xy 0 0 b i y x x y 0 0 b Bob Alice Bob Communication per xy-query: 2(log n + 3) = O(log n) 52 Appointment scheduling: epilogue Bit communication: Qubit communication: Cost: θ( Cost: θ( n) n 1/2 ) (with refinements) Bit communication & prior entanglement: Qubit communication & prior entanglement: Cost: θ( Cost: θ( n1/2) [R ‘02] [AA ‘03] n1/2) 53 Are exponential savings possible? 54 Restricted version of equality Precondition (i.e. promise): either x = y or (x,y) = n/2 Hamming distance (Distributed variant of “constant” vs. “balanced”) Classically, (n) bits communication are necessary for an exact solution Quantum mechanically, O(log n) qubits communication are sufficient for an exact solution [BCW ‘98] 55 Classical lower bound Theorem: If S {0,1}n has the property that, for all x, x′ S, their intersection size is not n/4 then S < 1.99n Let some protocol solve restricted equality with k bits comm. ● 2k conversations of length k ● approximately 2n/n input pairs (x, x), where Δ(x) = n/2 Therefore, 2n/2kn input pairs (x, x) that yield same conv. C Define S = {x : Δ(x) = n/2 and (x, x) yields conv. C } For any x, x′ S, input pair (x, x′ ) also yields conversation C Therefore, Δ(x, x′) n/2, implying intersection size is not n/4 Theorem implies 2n/2kn < 1.99n , so k > 0.007n [Frankl and Rödl, 1987] 56 Quantum protocol For each x n {0,1}n, define ψ x (1) xj j j 1 Protocol: 1. Alice sends x to Bob (log(n) qubits) 2. Bob measures state in a basis that includes y Correctness of protocol: If x = y then Bob’s result is definitely y If (x,y) = n/2 then xy = 0, so result is definitely not y Question: How much communication if error ¼ is permitted? Answer: just 2 bits are sufficient! 57 Exponential quantum vs. classical separation in bounded-error models O(log n) quantum vs. (n1/4 / log n) classical : a log(n)-qubit state (described classically) M: two-outcome measurement U: unitary operation on log(n) qubits Output: result of applying M to U [Raz, 1999] 58 Lower bound for the inner product problem 59 Inner product IP(x, y) = x1 y1 + x2 y2 + + xn yn mod 2 Classically, (n) bits of communication are required, even for bounded-error protocols Quantum protocols also require (n) communication [KY ‘95] [CNDT ‘98] [NS ‘02] 60 The BV black-box problem Bernstein & Vazirani Let f(x1, x2, …, xn) = a1 x1 + a2 x2 + + an xn mod 2 Given: 0 x1H 0 x2H H 0 xnH 1 bH f Hx1 a1 Hx2 a2 H Hxn an Hb 1f(x1, x2, …, xn) Goal: determine a1, a2 , …, an Classically, n queries are necessary Quantum mechanically, 1 query is sufficient 61 Lower bound for inner product IP(x, y) = x1 y1 + x2 y2 + + xn yn mod 2 Proof: x1 x2 xn y1 y2 yn z Alice and Bob’s IP protocol Alice and Bob’s IP protocol inverted x1 x2 xn y1 y2 yn zIP(x, y) 62 Lower bound for inner product IP(x, y) = x1 y1 + x2 y2 + + xn yn mod 2 Proof: x1 x2 xn 0 0 0 1 H H H H H x1 x2 xn 1 H Alice and Bob’s IP protocol Alice and Bob’s IP protocol inverted x1 x2 xn H H Since n bits are conveyed from Alice to Bob, n qubits communication necessary (by Holevo’s Theorem) 63 Simultaneous message passing and fingerprinting 64 Equality revisited in simultaneous message model x1x2 xn y1y2 yn f (x,y) Equality function: f (x,y) = 1 if x = y 0 if x y Exact protocols: require 2n bits communication 65 Equality revisited in simultaneous message model x1x2 xn y1y2 yn classical classical f (x,y) Pr[00] = Pr[11] = ½ Bounded-error protocols with a shared random key: require only O(1) bits communication Error-correcting code: e(x) = 1 0 1 1 1 1 0 1 0 1 1 0 0 1 1 0 0 1 e(y) = 0 1 1 0 1 0 0 1 0 0 1 1 0 0 1 0 1 0 random k 66 Equality revisited in simultaneous message model x1x2 xn Bounded-error protocols without a shared key: y1y2 yn f (x,y) Classical: θ(n1/2) Quantum: θ(log n) [A ‘96] [NS ‘96] [BCWW ‘01] 67 Quantum fingerprints Question 1: how many orthogonal states in m qubits? Answer: 2m Let be an arbitrarily small positive constant Question 2: how many almost orthogonal* states in m qubits? (* where |xy| ≤ ) am Answer: 22 , for some constant a > 0 The states can be constructed via a suitable (classical) errorcorrecting code, which is a function e :{0,1}n {0,1}cn where, for all x ≠ y, dcn ≤ Δ(e(x),e(y)) ≤ (1− d )cn (c, d are constants) 68 Construction of almost orthogonal states Set x 1 cn cn (1) e ( x )k k for each x{0,1}n (log(cn) qubits) k 1 Then xy 1 cn [ e ( x )e ( y )]k (1) cn k 1 2e( x), e( y ) k 1 cn Since dcn ≤ Δ(e(x),e(y)) ≤ (1− d )cn, we have |xy| ≤ 1− 2d By duplicating each state, xx … x, the pairwise inner products can be made arbitrarily small: (1− 2d )r ≤ m/r Result: m = r log(cn) qubits storing 2n = 2(1/c)2 different states 69 Quantum fingerprints Let 000, 001, …, 111 be 2n states on O(log n) qubits such that |xy| ≤ for all x ≠ y Given xy, one can check if x = y or x ≠ y as follows: 0 x y H H if x = y, Pr[output = 0] = 1 if x ≠ y, Pr[output = 0] = (1+ 2)/2 S W A P Intuition: 0xy + 1yx Note: error probability can be reduced to ((1+ 2)/2)r 70 Equality revisited in simultaneous message model x1x2 xn Bounded-error protocols without a shared key: y1y2 yn f (x,y) Classical: θ(n1/2) Quantum: θ(log n) [A ‘96] [NS ‘96] [BCWW ‘01] 71 Quantum protocol for equality in simultaneous message model x1x2 xn y1y2 yn x y x y Orthogonality test Recall that, with a shared key, the problem is easy classically ... 72 Hidden matching problem 73 Hidden matching problem For this problem, a quantum protocol is exponentially more efficient than any classical protocol—even with a shared key Inputs: x {0,1}n M= matching on {1, 2, …, n} Output: (i, j, xixj), such that ( i, j) M Only one-way communication (Alice to Bob) is permitted [Bar-Yossef, Jayram, Kerenidis, 2004] 74 The hidden matching problem Inputs: x {0,1}n M= matching on {1,2, …, n} Output: (i, j, xixj), (i, j) M Classically, one-way communication is (n), even with a shared classical key (the proof is omitted here) Rough intuition: Alice doesn’t know which edges are in M, so she apparently has to send (n) bits of the form xixj … 75 The hidden matching problem Inputs: matching on {1,2, …, n} M= x {0,1}n Output: (i, j, xixj), (i, j) M Quantum protocol: Alice sends 1 n n (1) k k x (log n qubits) k 1 Bob measures in i j basis, (i, j) M, and uses the outcome’s relative phase to determine xixj 76 Nonlocality revisited 77 Restricted-equality nonlocality inputs: x (n bits) y (n bits) outputs: a (log n bits) b (log n bits) Precondition: either x = y or (x,y) = n/2 Required postcondition: a = b iff x = y With classical resources, (n) bits of communication needed for an exact solution* With (00 + 11)log n prior entanglement, no communication is needed at all* Technical details similar to restricted equality of Lecture 17 [BCT ‘99] 78 Restricted-equality nonlocality Bit communication: Qubit communication: Cost: θ( Cost: log n) Bit communication & prior entanglement: Cost: zero n Qubit communication & prior entanglement: Cost: zero 79 Nonlocality and communication complexity conclusions • Quantum information affects communication complexity in interesting ways • There is a rich interplay between quantum communication complexity and: – quantum algorithms – quantum information theory – other notions of complexity theory … 80 81
© Copyright 2026 Paperzz