Introduction to Quantum Information Processing CS 467 / CS 667 Phys 467 / Phys 767 C&O 481 / C&O 681 Lecture 17 (2005) Richard Cleve DC 3524 [email protected] Course web site at: http://www.cs.uwaterloo.ca/~cleve/courses/cs467 1 Contents • The Bell inequality and its violation – Physicist’s perspective – Computer Scientist’s perspective • The magic square game • Communication complexity – – – – Equality checking Appointment scheduling (quadratic savings) Are exponential savings possible? Lower bound for the inner product problem • Simultaneous message passing and fingerprinting 2 • The Bell inequality and its violation – Physicist’s perspective – Computer Scientist’s perspective • The magic square game • Communication complexity – – – – Equality checking Appointment scheduling (quadratic savings) Are exponential savings possible? Lower bound for the inner product problem • Simultaneous message passing and fingerprinting 3 Bell’s Inequality and its violation Part II: computer scientist’s view: s input: output: a t b Rules: 1. No communication after inputs received 2. They win if ab = st With classical resources, Pr[ab = st] ≤ 0.75 But, with prior entanglement state 00 – 11, Pr[ab = st] = cos2(/8) = ½ + ¼√2 = 0.853… st ab 00 0 01 0 10 0 11 1 4 The quantum strategy • Alice and Bob start with entanglement = 00 – 11 • Alice: if s = 0 then rotate by A = /16 else rotate by A = + 3/16 and measure • Bob: if t = 0 then rotate by B = /16 else rotate by B = + 3/16 and measure st = 11 3/8 st = 01 or 10 /8 -/8 st = 00 cos(A – B ) (00 – 11) + sin(A – B ) (01 + 10) Success probability: Pr[ab = st] = cos2(/8) = ½ + ¼√2 = 0.853… 5 Nonlocality in operational terms information processing task ! classically, communication is needed quantum entanglement 6 • The Bell inequality and its violation – Physicist’s perspective – Computer Scientist’s perspective • The magic square game • Communication complexity – – – – Equality checking Appointment scheduling (quadratic savings) Are exponential savings possible? Lower bound for the inner product problem • Simultaneous message passing and fingerprinting 7 Magic square game Problem: fill in the matrix with bits such that each row has even parity and each column has odd parity a11 a12 a13 a21 a22 a23 even a31 a32 a33 even even odd odd odd Game: ask Alice to fill in one row and Bob to fill in one column They win iff parities are correct and bits agree at intersection Success probabilities: [Aravind, 2002] 8/9 classical and 1 quantum (details omitted here) 8 • The Bell inequality and its violation – Physicist’s perspective – Computer Scientist’s perspective • The magic square game • Communication complexity – – – – Equality checking Appointment scheduling (quadratic savings) Are exponential savings possible? Lower bound for the inner product problem • Simultaneous message passing and fingerprinting 9 Classical communication complexity [Yao, 1979] x1x2 xn y1y2 yn f (x,y) E.g. equality function: f (x,y) = 1 if x = y, and 0 if x y Any deterministic protocol requires n bits communication Probabilistic protocols can solve with only O(log(n/)) bits communication (error probability ), via random hashing 10 Quantum communication complexity x1 x2 xn y1 y2 yn Qubit communication qubits Prior entanglement entangled qubits x1 x2 xn f (x,y) y1 y2 yn bits f (x,y) 11 • The Bell inequality and its violation – Physicist’s perspective – Computer Scientist’s perspective • The magic square game • Communication complexity – – – – Equality checking Appointment scheduling (quadratic savings) Are exponential savings possible? Lower bound for the inner product problem • Simultaneous message passing and fingerprinting 12 Appointment scheduling 1 2 3 4 5 ... n x= 01101…0 1 2 3 4 5 ... n y= 10011…1 i (xi = yi = 1) Classically, (n) bits necessary to succeed with prob. 3/4 For all > 0, O(n1/2 log n) qubits sufficient for error prob. < [KS ‘87] [BCW ‘98] 13 Search problem 1 Given: 2 3 4 5 6 ... n x= 000010…1 log n i 1 b b x accessible via queries i b b xi Goal: find i{1, 2, …, n} such that xi = 1 Classically: (n) queries are necessary Quantum mechanically: O(n1/2) queries are sufficient [Grover, 1996] 14 1 2 3 4 5 6 ... n Alice x= 011010…0 Bob y= 100110…1 xy = 0 0 0 0 1 0 … 0 i xy 0 0 b i y x x y 0 0 b Bob Alice Bob Communication per xy-query: 2(log n + 3) = O(log n) 15 Appointment scheduling: epilogue Bit communication: Qubit communication: Cost: θ( Cost: θ( n) n 1/2 ) (with refinements) Bit communication & prior entanglement: Qubit communication & prior entanglement: Cost: θ( Cost: θ( n1/2) [R ‘02] [AA ‘03] n1/2) 16 • The Bell inequality and its violation – Physicist’s perspective – Computer Scientist’s perspective • The magic square game • Communication complexity – – – – Equality checking Appointment scheduling (quadratic savings) Are exponential savings possible? Lower bound for the inner product problem • Simultaneous message passing and fingerprinting 17 Restricted version of equality Precondition (i.e. promise): either x = y or (x,y) = n/2 Hamming distance (Distributed variant of “constant” vs. “balanced”) Classically, (n) bits communication are necessary for an exact solution Quantum mechanically, O(log n) qubits communication are sufficient for an exact solution [BCW ‘98] 18 Classical lower bound Theorem: If S {0,1}n has the property that, for all x, x′ S, their intersection size is not n/4 then S < 1.99n Let some protocol solve restricted equality with k bits comm. ● 2k conversations of length k ● approximately 2n/n input pairs (x, x), where Δ(x) = n/2 Therefore, 2n/2kn input pairs (x, x) that yield same conv. C Define S = {x : Δ(x) = n/2 and (x, x) yields conv. C } For any x, x′ S, input pair (x, x′ ) also yields conversation C Therefore, Δ(x, x′) n/2, implying intersection size is not n/4 Theorem implies 2n/2kn < 1.99n , so k > 0.007n [Frankl and Rödl, 1987] 19 Quantum protocol For each x n {0,1}n, define ψ x (1) xj j j 1 Protocol: 1. Alice sends x to Bob (log(n) qubits) 2. Bob measures state in a basis that includes y Correctness of protocol: If x = y then Bob’s result is definitely y If (x,y) = n/2 then xy = 0, so result is definitely not y Question: How much communication if error ¼ is permitted? Answer: just 2 bits are sufficient! 20 Exponential quantum vs. classical separation in bounded-error models O(log n) quantum vs. (n1/4 / log n) classical : a log(n)-qubit state (described classically) M: two-outcome measurement U: unitary operation on log(n) qubits Output: result of applying M to U [Raz, 1999] 21 • The Bell inequality and its violation – Physicist’s perspective – Computer Scientist’s perspective • The magic square game • Communication complexity – – – – Equality checking Appointment scheduling (quadratic savings) Are exponential savings possible? Lower bound for the inner product problem • Simultaneous message passing and fingerprinting 22 Inner product IP(x, y) = x1 y1 + x2 y2 + + xn yn mod 2 Classically, (n) bits of communication are required, even for bounded-error protocols Quantum protocols also require (n) communication [KY ‘95] [CNDT ‘98] [NS ‘02] 23 Recall the BV problem Let f(x1, x2, …, xn) = a1 x1 + a2 x2 + + an xn mod 2 Given: 0 x1H 0 x2H H 0 xnH 1 bH f Hx1 a1 Hx2 a2 H Hxn an Hb 1f(x1, x2, …, xn) Goal: determine a1, a2 , …, an Classically, n queries are necessary Quantum mechanically, 1 query is sufficient 24 Lower bound for inner product IP(x, y) = x1 y1 + x2 y2 + + xn yn mod 2 Proof: x1 x2 xn y1 y2 yn z Alice and Bob’s IP protocol Alice and Bob’s IP protocol inverted x1 x2 xn y1 y2 yn zIP(x, y) 25 Lower bound for inner product IP(x, y) = x1 y1 + x2 y2 + + xn yn mod 2 Proof: x1 x2 xn 0 0 0 1 H H H H H x1 x2 xn 1 H Alice and Bob’s IP protocol Alice and Bob’s IP protocol inverted x1 x2 xn H H Since n bits are conveyed from Alice to Bob, n qubits communication necessary (by Holevo’s Theorem) 26 • The Bell inequality and its violation – Physicist’s perspective – Computer Scientist’s perspective • The magic square game • Communication complexity – – – – Equality checking Appointment scheduling (quadratic savings) Are exponential savings possible? Lower bound for the inner product problem • Simultaneous message passing and fingerprinting 27 Equality revisited in simultaneous message model x1x2 xn y1y2 yn f (x,y) Equality function: f (x,y) = 1 if x = y 0 if x y Exact protocols: require 2n bits communication 28 Equality revisited in simultaneous message model x1x2 xn y1y2 yn classical classical f (x,y) Pr[00] = Pr[11] = ½ Bounded-error protocols with a shared random key: require only O(1) bits communication Error-correcting code: e(x) = 1 0 1 1 1 1 0 1 0 1 1 0 0 1 1 0 0 1 e(y) = 0 1 1 0 1 0 0 1 0 0 1 1 0 0 1 0 1 0 random k 29 Equality revisited in simultaneous message model x1x2 xn Bounded-error protocols without a shared key: y1y2 yn f (x,y) Classical: θ(n1/2) Quantum: θ(log n) [A ‘96] [NS ‘96] [BCWW ‘01] 30 Quantum fingerprints Question 1: how many orthogonal states in m qubits? Answer: 2m Let be an arbitrarily small positive constant Question 2: how many almost orthogonal* states in m qubits? (* where |xy| ≤ ) am Answer: 22 , for some constant a > 0 The states can be constructed via a suitable (classical) errorcorrecting code, which is a function e :{0,1}n {0,1}cn where, for all x ≠ y, dcn ≤ Δ(e(x),e(y)) ≤ (1− d )cn (c, d are constants) 31 Construction of almost orthogonal states Set x 1 cn cn (1) e ( x )k k for each x{0,1}n (log(cn) qubits) k 1 Then xy 1 cn [ e ( x )e ( y )]k (1) cn k 1 2e( x), e( y ) k 1 cn Since dcn ≤ Δ(e(x),e(y)) ≤ (1− d )cn, we have |xy| ≤ 1− 2d By duplicating each state, xx … x, the pairwise inner products can be made arbitrarily small: (1− 2d )r ≤ m/r Result: m = r log(cn) qubits storing 2n = 2(1/c)2 different states 32 Quantum fingerprints Let 000, 001, …, 111 be 2n states on O(log n) qubits such that |xy| ≤ for all x ≠ y Given xy, one can check if x = y or x ≠ y as follows: 0 x y H H if x = y, Pr[output = 0] = 1 if x ≠ y, Pr[output = 0] = (1+ 2)/2 S W A P Intuition: 0xy + 1yx Note: error probability can be reduced to ((1+ 2)/2)r 33 Equality revisited in simultaneous message model x1x2 xn Bounded-error protocols without a shared key: y1y2 yn f (x,y) Classical: θ(n1/2) Quantum: θ(log n) [A ‘96] [NS ‘96] [BCWW ‘01] 34 Quantum protocol for equality in simultaneous message model x1x2 xn y1y2 yn x y x y Orthogonality test Recall that, with a shared key, the problem is easy classically ... 35 36
© Copyright 2026 Paperzz