effcient quantum protocols for xor functions

18
Effcient quantum protocols for XOR functions Shengyu Zhang The Chinese University of Hong Kong

Upload: zohar

Post on 24-Feb-2016

29 views

Category:

Documents


0 download

DESCRIPTION

Effcient quantum protocols for XOR functions. Shengyu Zhang The Chinese University of Hong Kong. Communication complexity. Two parties, Alice and Bob, jointly compute a function on input . known only to Alice and only to Bob. - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Effcient  quantum protocols for XOR functions

Effcient quantum protocols for XOR functions

Shengyu Zhang

The Chinese University of Hong Kong

Page 2: Effcient  quantum protocols for XOR functions

Communication complexity

• Two parties, Alice and Bob, jointly compute a function on input . – known only to Alice and only to Bob.

• Communication complexity*1: how many bits are needed to be exchanged?

𝑥 𝑦

*1. A. Yao. STOC, 1979.

Page 3: Effcient  quantum protocols for XOR functions

Computation modes

• Deterministic: Players run determ. protocol. ---• Randomized: Players have access to random bits;

small error probability allowed. --- • Quantum: Players send quantum messages.– Share resource? (Superscript.)

• : share entanglement. • : share nothing

– Error? (Subscript)• : bounded-error. • : zero-error, fixed length.

Page 4: Effcient  quantum protocols for XOR functions

4

Lower bounds• Not only interesting on its own, but also important

because of numerous applications.– to prove lower bounds.

• Question: How to lower bound communication complexity itself?

• Communication matrix

𝑥→ 𝐹 (𝑥 , 𝑦 )

Page 5: Effcient  quantum protocols for XOR functions

5

Log-rank conjecture• Rank lower bound*1

• Conj: The rank lower bound is polynomially tight.• combinatorial measure linear algebra measure.• Equivalent to a bunch of other conjectures.– related to graph theory*2; nonnegative rank*3, Boolean

roots of polynomials*4, quantum sampling complexity*5.

*1. Melhorn, Schmidt. STOC, 1982. *2. Lovász, Saks. FOCS, 1988.*3. Lovász. Book Chapter, 1990.

*4. Valiant. Info. Proc. Lett., 2004.*5. Ambainis, Schulman, Ta-Shma, Vazirani, Wigderson, SICOMP 2003.

≤ log𝑂 (1 )𝑟𝑎𝑛𝑘 (𝑀𝐹 )Log Rank Conjecture*2

Page 6: Effcient  quantum protocols for XOR functions

6

Log-rank conjecture: quantum version• Rank lower bound

• Quantum: rank lower bound *1

*1. Buhrman, de Wolf. CCC, 2001.

≤ log𝑂 (1 )𝑟𝑎𝑛𝑘 (𝑀𝐹 )Log Rank Conjecture

Page 7: Effcient  quantum protocols for XOR functions

Log-rank conjecture for XOR functions

• Since Log-rank conjecture appears too hard in its full generality,…

• let’s try some special class of functions.• XOR functions: . ---– The linear composition of and .– Include important functions such as Equality,

Hamming Distance, Gap Hamming Distance.• Interesting connections to Fourier analysis of

functions on .

Page 8: Effcient  quantum protocols for XOR functions

Digression: Fourier analysis

• can be written as

– , and characters are orthogonal – : Fourier coefficients of – Parseval: If , then .

• Two important measures: – --- Spectral norm.– --- Fourier sparsity.

• Cauchy-Schwartz: for

Page 9: Effcient  quantum protocols for XOR functions

Log-rank Conj. For XOR functions

• Interesting connections to Fourier analysis:• 1. . • Log-rank Conj: • Thm.*1

• Thm.*1 .– : degree of as polynomial over .– Fact*2. .

*1. Tsang, Wong, Xie, Zhang, FOCS, 2013.*2. Bernasconi and Codenotti. IEEE Transactions on Computers, 1999.

Page 10: Effcient  quantum protocols for XOR functions

Quantum

• 2. *1

• This paper: , where .– Recall classical: – Confirms quantum Log-rank Conjecture for low-

degree XOR functions.• This talk: A simpler case .

– . *2

*1. Lee and Shraibman. Foundations and Trends in Theoretical Computer Science, 2009.*2. Buhrman and de Wolf. CCC, 2001.

Ω ( log 𝑟𝑎𝑛𝑘𝜖 (𝑀 𝑓 ∘⊕ ))≥

Page 11: Effcient  quantum protocols for XOR functions

About quantum protocol

• Much simpler.

• comes very naturally.

• Inherently quantum.– Not from quantizing any classical protocol.

Page 12: Effcient  quantum protocols for XOR functions

|𝜓 ⟩=∑𝛼∈𝐴

�̂� (𝛼 ) 𝜒 𝛼 (𝑥 )|𝐸 (𝛼 ) ⟩ |𝜓 ⟩

|𝜓 ′ ⟩=∑𝛼∈ 𝐴

�̂� (𝛼 ) 𝜒 𝛼 (𝑥 ) 𝜒 𝛼(𝑦 )|𝐸 (𝛼 ) ⟩Add phase

|𝜓 ′ ⟩

∑𝛼∈𝐴

𝑓 (𝛼 ) 𝜒𝛼 (𝑥+ 𝑦 )|𝛼 ⟩|𝐸 (𝛼 ) ⟩ →|𝛼 ⟩

Fourier:

|0 ⟩ +|1 ⟩√2

∑𝑡

|0 ⟩+ 𝑓 (𝑥+𝑦+𝑡)|1 ⟩√2

|𝑡 ⟩

Goal: compute where

Page 13: Effcient  quantum protocols for XOR functions

|𝜓 ⟩=¿+⟩ ∑𝛼∈𝐴

𝑓 (𝛼 ) 𝜒𝛼 (𝑥 )|𝐸 (𝛼 ) ⟩ |𝜓 ⟩Add phase |𝜓 ′ ⟩

Decoding + Fourier

∑𝑡

|0 ⟩+ 𝑓 (𝑥+𝑦+𝑡)|1 ⟩√2

|𝑡 ⟩

Measure Measure

A random and .Recall our target: . What’s the difference? The derivative: . Good: .Bad: .(That’s where the factor of comes from.)

• One more issue: Only Alice knows ! Bob doesn’t.

• It’s unaffordable to send .• Obs: .

Goal: compute where

Page 14: Effcient  quantum protocols for XOR functions

|𝜓 ⟩=¿+⟩ ∑𝛼∈𝐴

𝑓 (𝛼 ) 𝜒𝛼 (𝑥 )|𝐸 (𝛼 ) ⟩ |𝜓 ⟩Add phase |𝜓 ′ ⟩

Decoding + Fourier

∑𝑡

|0 ⟩+ 𝑓 (𝑥+𝑦+𝑡)|1 ⟩√2

|𝑡 ⟩

Measure Measure

A random and .Recall our target: . What’s the difference? The derivative: . Good: .Bad: .(That’s where the factor of comes from.)

• One more issue: Only Alice knows ! Bob doesn’t.

• It’s unaffordable to send .• Obs: .

𝐴

{0,1 }𝑛

Goal: compute where

Page 15: Effcient  quantum protocols for XOR functions

|𝜓 ⟩=¿+⟩ ∑𝛼∈𝐴

𝑓 (𝛼 ) 𝜒𝛼 (𝑥 )|𝐸 (𝛼 ) ⟩ |𝜓 ⟩Add phase |𝜓 ′ ⟩

Decoding + Fourier

∑𝑡

|0 ⟩+ 𝑓 (𝑥+𝑦+𝑡)|1 ⟩√2

|𝑡 ⟩

Measure Measure

A random and .Recall our target: . What’s the difference? The derivative: . Good: .Bad: .(That’s where the factor of comes from.)

• One more issue: Only Alice knows ! Bob doesn’t.

• It’s unaffordable to send .• Obs: .

• Thus in round 2, Alice and Bob can just encode the entire .

Goal: compute where

Page 16: Effcient  quantum protocols for XOR functions

|𝜓 ⟩=¿+⟩ ∑𝛼∈𝐴

𝑓 (𝛼 ) 𝜒𝛼 (𝑥 )|𝐸 (𝛼 ) ⟩ |𝜓 ⟩Add phase |𝜓 ′ ⟩

Decoding + Fourier

∑𝑡

|0 ⟩+ 𝑓 (𝑥+𝑦+𝑡)|1 ⟩√2

|𝑡 ⟩

Measure Measure

A random and .Compute .

At last, , a constant function.Cost: .

Used trivial bound:

Goal: compute where

Page 17: Effcient  quantum protocols for XOR functions

Open problems

• Get rid of the factor !

• What can we say about additive structure of for Boolean functions ? Say, ?

Page 18: Effcient  quantum protocols for XOR functions