lecture 20: the adversary methododonnell/quantum18/lecture20.pdfย ยท lecture 20: the adversary...

52
Lecture 20: The Adversary Method for Quantum Query Lower Bounds

Upload: others

Post on 08-Aug-2020

7 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Lecture 20: The Adversary Methododonnell/quantum18/lecture20.pdfย ยท Lecture 20: The Adversary Method for Quantum Query Lower Bounds. Secret N-bit input string w You can query a coordinate

Lecture 20:

The Adversary Methodfor Quantum Query Lower Bounds

Page 2: Lecture 20: The Adversary Methododonnell/quantum18/lecture20.pdfย ยท Lecture 20: The Adversary Method for Quantum Query Lower Bounds. Secret N-bit input string w You can query a coordinate

Secret N-bit input string w

You can query a coordinate j to find out ๐‘ค๐‘—

In fact, you can query superpositionsโ€ฆ

Given access to ๐‘„๐‘คยฑ which implements ๐‘— โ†ฆ โˆ’1 ๐‘ค๐‘—|๐‘—โŸฉ

Trying to solve some fixed decision problem ๐œ‘ on w

Example: ๐œ‘ = โ€œORโ€, deciding if w has at least one 1

Think of ๐œ‘ = (๐˜๐„๐’, ๐๐Ž), where YES and NO are subsets of strings.In โ€œORโ€ example, YES = {all N-bit strings with at least one 1}, NO = {00โˆ™โˆ™โˆ™0}

If ๐˜๐„๐’ โˆช ๐๐Ž = {all strings}, ๐œ‘ is called โ€œtotalโ€; otherwise, ๐œ‘ is โ€œpartial/promiseโ€

Quantum query model: recap

Cost: only the number of uses of ๐‘„๐‘คยฑ

Groverโ€™s Algorithm: Solves ๐œ‘ = โ€œORโ€ with cost โ‰ฒ ๐‘

Page 3: Lecture 20: The Adversary Methododonnell/quantum18/lecture20.pdfย ยท Lecture 20: The Adversary Method for Quantum Query Lower Bounds. Secret N-bit input string w You can query a coordinate

[Bennettโ€“Bernsteinโ€“Brassardโ€“Vazirani ca. โ€™96]:

Proved a cost lower bound for ๐œ‘ = โ€œORโ€: โ‰ณ ๐‘ queries are necessary.

They called their technique the Hybrid Method.

How to prove Lower Bounds on quantum query algorithmsโ€ฆ

[Bealsโ€“Buhrmanโ€“Cleveโ€“Moscaโ€“de Wolf โ€™98]: The Polynomial Method.

[Ambainis โ€™00]: The (Basic) Adversary Method.

[Many groups]: Variants on the Adversary Method.

[Hรธyerโ€“Leeโ€“ล palek โ€™07]: โ€œNegative-weightsโ€, aka General Adversary Method.

[Reichardt โ€™09]: The General Adversary Method is optimal โ€” there is always a matching upper bound (query algorithm)!

Page 4: Lecture 20: The Adversary Methododonnell/quantum18/lecture20.pdfย ยท Lecture 20: The Adversary Method for Quantum Query Lower Bounds. Secret N-bit input string w You can query a coordinate

A generic T-query algorithm:

log(N)-qubitquery register

๐‘ˆ0

๐‘„๐‘คยฑ

๐‘ˆ1

๐‘„๐‘คยฑ ๐‘„๐‘ค

ยฑ

๐‘ˆ๐‘‡

โ€ขโ€ขโ€ขโ€œworkspaceโ€

qubits

Secret N-bit input string w defines the behavior of ๐‘„๐‘คยฑ

Page 5: Lecture 20: The Adversary Methododonnell/quantum18/lecture20.pdfย ยท Lecture 20: The Adversary Method for Quantum Query Lower Bounds. Secret N-bit input string w You can query a coordinate

๐‘ˆ0

๐‘„๐‘คยฑ

๐‘ˆ1

๐‘„๐‘คยฑ ๐‘„๐‘ค

ยฑ

๐‘ˆ๐‘‡

โ€ขโ€ขโ€ข

0000000

โ€ขโ€ขโ€ข

An algorithm supposedly solving ๐œ‘ = (๐˜๐„๐’, ๐๐Ž):

Secret N-bit input string w defines the behavior of ๐‘„๐‘คยฑ

๐œ“๐‘ค0 ๐œ“๐‘ค

1 ๐œ“๐‘ค๐‘‡โˆ’1 ๐œ“๐‘ค

๐‘‡

Page 6: Lecture 20: The Adversary Methododonnell/quantum18/lecture20.pdfย ยท Lecture 20: The Adversary Method for Quantum Query Lower Bounds. Secret N-bit input string w You can query a coordinate

๐‘ˆ0

๐‘„๐‘คยฑ

๐‘ˆ1

๐‘„๐‘คยฑ ๐‘„๐‘ค

ยฑ

๐‘ˆ๐‘‡

โ€ขโ€ขโ€ข

0000000

โ€ขโ€ขโ€ข

An algorithm supposedly solving ๐œ‘ = (๐˜๐„๐’, ๐๐Ž):

๐œ“๐‘ค0 ๐œ“๐‘ค

1 ๐œ“๐‘ค๐‘‡โˆ’1 ๐œ“๐‘ค

๐‘‡

An โ€œadversaryโ€ picks some ๐’š โˆˆ ๐˜๐„๐’ and some ๐’› โˆˆ ๐๐Žand considers running your algorithm with ๐‘ค = ๐’š or with ๐‘ค = ๐’›.

Page 7: Lecture 20: The Adversary Methododonnell/quantum18/lecture20.pdfย ยท Lecture 20: The Adversary Method for Quantum Query Lower Bounds. Secret N-bit input string w You can query a coordinate

๐‘ˆ0

๐‘„๐‘คยฑ

๐‘ˆ1

๐‘„๐‘คยฑ ๐‘„๐‘ค

ยฑ

๐‘ˆ๐‘‡

โ€ขโ€ขโ€ข

0000000

An algorithm supposedly solving ๐œ‘ = (๐˜๐„๐’, ๐๐Ž):

๐œ“๐‘ค0

An โ€œadversaryโ€ picks some ๐’š โˆˆ ๐˜๐„๐’ and some ๐’› โˆˆ ๐๐Žand considers running your algorithm with ๐‘ค = ๐’š or with ๐‘ค = ๐’›.

Clearly: ๐œ“๐’š0 = |๐œ“๐’›

0โŸฉ; ๐œ“๐’š0 ๐œ“๐’›

0 = 1i.e.,

Page 8: Lecture 20: The Adversary Methododonnell/quantum18/lecture20.pdfย ยท Lecture 20: The Adversary Method for Quantum Query Lower Bounds. Secret N-bit input string w You can query a coordinate

๐‘ˆ0

๐‘„๐‘คยฑ

๐‘ˆ1

๐‘„๐‘คยฑ ๐‘„๐‘ค

ยฑ

๐‘ˆ๐‘‡

โ€ขโ€ขโ€ข

0000000

An algorithm supposedly solving ๐œ‘ = (๐˜๐„๐’, ๐๐Ž):

An โ€œadversaryโ€ picks some ๐’š โˆˆ ๐˜๐„๐’ and some ๐’› โˆˆ ๐๐Žand considers running your algorithm with ๐‘ค = ๐’š or with ๐‘ค = ๐’›.

๐œ“๐‘ค๐‘‡๐œ“๐’š

0 ๐œ“๐’›0 = 1

Page 9: Lecture 20: The Adversary Methododonnell/quantum18/lecture20.pdfย ยท Lecture 20: The Adversary Method for Quantum Query Lower Bounds. Secret N-bit input string w You can query a coordinate

๐‘ˆ0

๐‘„๐‘คยฑ

๐‘ˆ1

๐‘„๐‘คยฑ ๐‘„๐‘ค

ยฑ

๐‘ˆ๐‘‡

โ€ขโ€ขโ€ข

0000000

An algorithm supposedly solving ๐œ‘ = (๐˜๐„๐’, ๐๐Ž):

An โ€œadversaryโ€ picks some ๐’š โˆˆ ๐˜๐„๐’ and some ๐’› โˆˆ ๐๐Žand considers running your algorithm with ๐‘ค = ๐’š or with ๐‘ค = ๐’›.

๐œ“๐’š๐‘‡ ๐œ“๐’›

๐‘‡ โ‰  1Clearly:๐œ“๐’š0 ๐œ“๐’›

0 = 1

Algorithm must be able to discriminate between

|๐œ“๐’š๐‘‡โŸฉ and |๐œ“๐’›

๐‘‡โŸฉ with high probability,

because it must โ€œacceptโ€ y and โ€œrejectโ€ z.

Page 10: Lecture 20: The Adversary Methododonnell/quantum18/lecture20.pdfย ยท Lecture 20: The Adversary Method for Quantum Query Lower Bounds. Secret N-bit input string w You can query a coordinate

๐‘ˆ0

๐‘„๐‘คยฑ

๐‘ˆ1

๐‘„๐‘คยฑ ๐‘„๐‘ค

ยฑ

๐‘ˆ๐‘‡

โ€ขโ€ขโ€ข

0000000

An algorithm supposedly solving ๐œ‘ = (๐˜๐„๐’, ๐๐Ž):

An โ€œadversaryโ€ picks some ๐’š โˆˆ ๐˜๐„๐’ and some ๐’› โˆˆ ๐๐Žand considers running your algorithm with ๐‘ค = ๐’š or with ๐‘ค = ๐’›.

๐œ“๐’š๐‘‡ ๐œ“๐’›

๐‘‡ โ‰ค .99In fact, we better have๐œ“๐’š0 ๐œ“๐’›

0 = 1

Algorithm must be able to discriminate between

|๐œ“๐’š๐‘‡โŸฉ and |๐œ“๐’›

๐‘‡โŸฉ with high probability,

because it must โ€œacceptโ€ y and โ€œrejectโ€ z.

Page 11: Lecture 20: The Adversary Methododonnell/quantum18/lecture20.pdfย ยท Lecture 20: The Adversary Method for Quantum Query Lower Bounds. Secret N-bit input string w You can query a coordinate

๐‘ˆ0

๐‘„๐‘คยฑ

๐‘ˆ1

๐‘„๐‘คยฑ ๐‘„๐‘ค

ยฑ

๐‘ˆ๐‘‡

โ€ขโ€ขโ€ข

0000000

An algorithm supposedly solving ๐œ‘ = (๐˜๐„๐’, ๐๐Ž):

An โ€œadversaryโ€ picks some ๐’š โˆˆ ๐˜๐„๐’ and some ๐’› โˆˆ ๐๐Žand considers running your algorithm with ๐‘ค = ๐’š or with ๐‘ค = ๐’›.

๐œ“๐’š๐‘‡ ๐œ“๐’›

๐‘‡ โ‰ค .99In fact, we better have๐œ“๐’š0 ๐œ“๐’›

0 = 1

Algorithm must be able to discriminate between

|๐œ“๐’š๐‘‡โŸฉ and |๐œ“๐’›

๐‘‡โŸฉ with high probability,

because it must โ€œacceptโ€ y and โ€œrejectโ€ z.

Recall Lecture 4.5, โ€œDiscriminating Two Qubitsโ€:

Given two quantum states |๐’–โŸฉ and |๐’—โŸฉ,the probability with which they can be distinguished by anyquantum algorithm is a function of the angle between them.

Page 12: Lecture 20: The Adversary Methododonnell/quantum18/lecture20.pdfย ยท Lecture 20: The Adversary Method for Quantum Query Lower Bounds. Secret N-bit input string w You can query a coordinate

๐‘ˆ0

๐‘„๐‘คยฑ

๐‘ˆ1

๐‘„๐‘คยฑ ๐‘„๐‘ค

ยฑ

๐‘ˆ๐‘‡

โ€ขโ€ขโ€ข

0000000

An โ€œadversaryโ€ picks some ๐’š โˆˆ ๐˜๐„๐’ and some ๐’› โˆˆ ๐๐Žand considers running your algorithm with ๐‘ค = ๐’š or with ๐‘ค = ๐’›.

๐œ“๐’š๐‘‡ ๐œ“๐’›

๐‘‡ โ‰ค .99We have๐œ“๐’š0 ๐œ“๐’›

0 = 1

Possible idea: define Progress๐‘ก = ๐œ“๐’š๐‘ก ๐œ“๐’›

๐‘ก

Suppose we can show Progress๐‘ก โˆ’ Progress๐‘ก+1 โ‰ค ๐›ฟ

This would imply: ๐‘‡ โ‰ฅ .01/๐›ฟ โ˜บ

Page 13: Lecture 20: The Adversary Methododonnell/quantum18/lecture20.pdfย ยท Lecture 20: The Adversary Method for Quantum Query Lower Bounds. Secret N-bit input string w You can query a coordinate

๐‘ˆ0

๐‘„๐‘คยฑ

๐‘ˆ1

๐‘„๐‘คยฑ ๐‘„๐‘ค

ยฑ

๐‘ˆ๐‘‡

โ€ขโ€ขโ€ข

0000000

An โ€œadversaryโ€ picks some ๐’š โˆˆ ๐˜๐„๐’ and some ๐’› โˆˆ ๐๐Žand considers running your algorithm with ๐‘ค = ๐’š or with ๐‘ค = ๐’›.

Possible idea: define Progress๐‘ก = ๐œ“๐’š๐‘ก ๐œ“๐’›

๐‘ก

Suppose we can show Progress๐‘ก โˆ’ Progress๐‘ก+1 โ‰ค ๐›ฟ

This would imply: ๐‘‡ โ‰ฅ .01/๐›ฟ โ˜บ

Note: Applying unitary Ut does not affect ๐œ“๐’š๐‘ก ๐œ“๐’›

๐‘ก

So suffices to analyze how ๐‘„๐‘คยฑ affects Progress

Page 14: Lecture 20: The Adversary Methododonnell/quantum18/lecture20.pdfย ยท Lecture 20: The Adversary Method for Quantum Query Lower Bounds. Secret N-bit input string w You can query a coordinate

An โ€œadversaryโ€ picks some ๐’š โˆˆ ๐˜๐„๐’ and some ๐’› โˆˆ ๐๐Žand considers running your algorithm with ๐‘ค = ๐’š or with ๐‘ค = ๐’›.

Possible idea: define Progress๐‘ก = ๐œ“๐’š๐‘ก ๐œ“๐’›

๐‘ก

Suppose we can show Progress๐‘ก โˆ’ Progress๐‘ก+1 โ‰ค ๐›ฟ

This would imply: ๐‘‡ โ‰ฅ .01/๐›ฟ โ˜บ

Note: Applying unitary Ut does not affect ๐œ“๐’š๐‘ก ๐œ“๐’›

๐‘ก

So suffices to analyze how ๐‘„๐‘คยฑ affects Progress

This is a good idea, but a little too simple

Doesnโ€™t suffice to focus on a single ๐’š โˆˆ ๐˜๐„๐’ and a single ๐’› โˆˆ ๐๐Ž

If it did, would show that many queries needed to distinguish ๐‘ค = ๐’š from ๐‘ค = ๐’›

But this only requires 1 query: since ๐’š โ‰  ๐’›, there exists j such that ๐’š๐‘— โ‰  ๐’›๐‘—

Need to have a bunch of ๐’šโ€™s versus a bunch of ๐’›โ€™s

Page 15: Lecture 20: The Adversary Methododonnell/quantum18/lecture20.pdfย ยท Lecture 20: The Adversary Method for Quantum Query Lower Bounds. Secret N-bit input string w You can query a coordinate

dist(y, z) = Hamming distance, # of coordinates where y, z differ

weโ€™ll show โ‰ฅ .005 ๐‘š ๐‘šโ€ฒ

[Ambainis โ€™00]Super-Basic Adversary Method:

For ๐œ‘ = (YES, NO), suppose ๐’€ โŠ† YES, ๐’ โŠ† NO are such that:

โ€ข for each ๐’š โˆˆ ๐’€, there are at least ๐‘š strings ๐’› โˆˆ ๐’ with dist(y, z) = 1

โ€ข for each ๐’› โˆˆ ๐’, there are at least ๐‘šโ€ฒ strings ๐’š โˆˆ ๐’€ with dist(y, z) = 1

Then Q(๐œ‘), the quantum query complexity of ๐œ‘, is โ‰ณ ๐‘š๐‘šโ€ฒ.

Page 16: Lecture 20: The Adversary Methododonnell/quantum18/lecture20.pdfย ยท Lecture 20: The Adversary Method for Quantum Query Lower Bounds. Secret N-bit input string w You can query a coordinate

Super-Basic Adversary Method:

For ๐œ‘ = (YES, NO), suppose ๐’€ โŠ† YES, ๐’ โŠ† NO are such that:

โ€ข for each ๐’š โˆˆ ๐’€, there are at least ๐‘š strings ๐’› โˆˆ ๐’ with dist(y, z) = 1

โ€ข for each ๐’› โˆˆ ๐’, there are at least ๐‘šโ€ฒ strings ๐’š โˆˆ ๐’€ with dist(y, z) = 1

Then Q(๐œ‘), the quantum query complexity of ๐œ‘, is โ‰ณ ๐‘š๐‘šโ€ฒ.

Example use #1: ๐œ‘ = โ€œORโ€ (Decision-Grover)

Take ๐’€ = {000001, 000010, 000100, 001000, 010000, 100000}.

Take ๐’ = {000000}. (Well, at least for N = 6.)

๐‘š = 1, ๐‘šโ€ฒ = ๐‘ โ‡’ Q(๐œ‘) โ‰ณ ๐‘ โ˜บ

Page 17: Lecture 20: The Adversary Methododonnell/quantum18/lecture20.pdfย ยท Lecture 20: The Adversary Method for Quantum Query Lower Bounds. Secret N-bit input string w You can query a coordinate

Super-Basic Adversary Method:

For ๐œ‘ = (YES, NO), suppose ๐’€ โŠ† YES, ๐’ โŠ† NO are such that:

โ€ข for each ๐’š โˆˆ ๐’€, there are at least ๐‘š strings ๐’› โˆˆ ๐’ with dist(y, z) = 1

โ€ข for each ๐’› โˆˆ ๐’, there are at least ๐‘šโ€ฒ strings ๐’š โˆˆ ๐’€ with dist(y, z) = 1

Then Q(๐œ‘), the quantum query complexity of ๐œ‘, is โ‰ณ ๐‘š๐‘šโ€ฒ.

Example use #2: ๐œ‘: Decide if w has at least k 1โ€™s, or less than k 1โ€™s

Take ๐’€ = {all strings with exactly k 1โ€™s}.

Take ๐’ = {all strings with exactly ๐‘˜ โˆ’ 1 1โ€™s}.

๐‘š = ๐‘˜, ๐‘šโ€ฒ = ๐‘ โˆ’ ๐‘˜ + 1

โ‡’ Q(๐œ‘) โ‰ณ ๐‘˜(๐‘ โˆ’ ๐‘˜ + 1), which is โ‰ณ ๐‘˜๐‘ for ๐‘˜ โ‰ค๐‘

2

Page 18: Lecture 20: The Adversary Methododonnell/quantum18/lecture20.pdfย ยท Lecture 20: The Adversary Method for Quantum Query Lower Bounds. Secret N-bit input string w You can query a coordinate

Super-Basic Adversary Method:

For ๐œ‘ = (YES, NO), suppose ๐’€ โŠ† YES, ๐’ โŠ† NO are such that:

โ€ข for each ๐’š โˆˆ ๐’€, there are at least ๐‘š strings ๐’› โˆˆ ๐’ with dist(y, z) = 1

โ€ข for each ๐’› โˆˆ ๐’, there are at least ๐‘šโ€ฒ strings ๐’š โˆˆ ๐’€ with dist(y, z) = 1

Then Q(๐œ‘), the quantum query complexity of ๐œ‘, is โ‰ณ ๐‘š๐‘šโ€ฒ.

Example use #3:

AND

OR OR OR

๐‘

๐‘

๐œ‘

๐‘ค1๐‘ค2 ๐‘ค ๐‘ ๐‘ค๐‘

YES = strings with a 1 in each โ€˜blockโ€™NO = strings with a block of all 0โ€™s

Y= strings with exactly one 1 per block

Z= strings with exactly one all-0โ€™s block,all other blocks having exactly one 1

๐‘š = ๐‘, ๐‘šโ€ฒ = ๐‘ โ‡’ Q(๐œ‘) โ‰ณ ๐‘

This lower bound is sharp, and not known to be attainable by the โ€œPolynomial Methodโ€

Page 19: Lecture 20: The Adversary Methododonnell/quantum18/lecture20.pdfย ยท Lecture 20: The Adversary Method for Quantum Query Lower Bounds. Secret N-bit input string w You can query a coordinate

Super-Basic Adversary Method:

For ๐œ‘ = (YES, NO), suppose ๐’€ โŠ† YES, ๐’ โŠ† NO are such that:

โ€ข for each ๐’š โˆˆ ๐’€, there are at least ๐‘š strings ๐’› โˆˆ ๐’ with dist(y, z) = 1

โ€ข for each ๐’› โˆˆ ๐’, there are at least ๐‘šโ€ฒ strings ๐’š โˆˆ ๐’€ with dist(y, z) = 1

Then Q(๐œ‘), the quantum query complexity of ๐œ‘, is โ‰ณ ๐‘š๐‘šโ€ฒ.

Proof: Define R = { (๐’š, ๐’›) : dist(y, z) = 1 } โŠ† ๐’€ ร— ๐’

(These are particularly challenging pairs of inputs for the algorithm:the algorithm needs to give different answers on them,

but there is only a single coordinate where they are different.)

Page 20: Lecture 20: The Adversary Methododonnell/quantum18/lecture20.pdfย ยท Lecture 20: The Adversary Method for Quantum Query Lower Bounds. Secret N-bit input string w You can query a coordinate

Super-Basic Adversary Method:

For ๐œ‘ = (YES, NO), suppose ๐’€ โŠ† YES, ๐’ โŠ† NO are such that:

โ€ข for each ๐’š โˆˆ ๐’€, there are at least ๐‘š strings ๐’› โˆˆ ๐’ with dist(y, z) = 1

โ€ข for each ๐’› โˆˆ ๐’, there are at least ๐‘šโ€ฒ strings ๐’š โˆˆ ๐’€ with dist(y, z) = 1

Then Q(๐œ‘), the quantum query complexity of ๐œ‘, is โ‰ณ ๐‘š๐‘šโ€ฒ.

Proof: Define R = { (๐’š, ๐’›) : dist(y, z) = 1 } โŠ† ๐’€ ร— ๐’

Progress๐‘ก =

๐’š,๐’› โˆˆ๐‘…

๐œ“๐’š๐‘ก ๐œ“๐’›

๐‘กDefine , where |๐œ“๐‘ค๐‘ก โŸฉ is state after tth query, on input w

We have Progress0 = |๐‘…| and Progress๐‘‡ โ‰ค .99|๐‘…|

the latter because ๐œ“๐’š๐‘‡ ๐œ“๐’›

๐‘‡ โ‰ค .99 must hold for all ๐’š โˆˆ ๐’€, ๐’› โˆˆ ๐’

Page 21: Lecture 20: The Adversary Methododonnell/quantum18/lecture20.pdfย ยท Lecture 20: The Adversary Method for Quantum Query Lower Bounds. Secret N-bit input string w You can query a coordinate

Super-Basic Adversary Method:

For ๐œ‘ = (YES, NO), suppose ๐’€ โŠ† YES, ๐’ โŠ† NO are such that:

Then Q(๐œ‘), the quantum query complexity of ๐œ‘, is โ‰ณ ๐‘š๐‘šโ€ฒ.

Proof: Define

Progress๐‘ก =

๐’š,๐’› โˆˆ๐‘…

๐œ“๐’š๐‘ก ๐œ“๐’›

๐‘กDefine , where |๐œ“๐‘ค๐‘ก โŸฉ is state after tth query, on input w

We have Progress0 = |๐‘…| and Progress๐‘‡ โ‰ค .99|๐‘…|

Claim: Progress๐‘ก โˆ’ Progress๐‘ก+1 โ‰ค2

๐‘š๐‘šโ€ฒ|๐‘…| for all t.

โ‡’ T โ‰ฅ .005 ๐‘š ๐‘šโ€ฒ, as desired.

โ€ข for each ๐’š โˆˆ ๐’€, there are at least ๐‘š strings ๐’› โˆˆ ๐’ with dist(y, z) = 1

โ€ข for each ๐’› โˆˆ ๐’, there are at least ๐‘šโ€ฒ strings ๐’š โˆˆ ๐’€ with dist(y, z) = 1

R = { (๐’š, ๐’›) : dist(y, z) = 1 } โŠ† ๐’€ ร— ๐’

Page 22: Lecture 20: The Adversary Methododonnell/quantum18/lecture20.pdfย ยท Lecture 20: The Adversary Method for Quantum Query Lower Bounds. Secret N-bit input string w You can query a coordinate

โ€ข for each ๐’š โˆˆ ๐’€, there are at least ๐‘š strings ๐’› โˆˆ ๐’ with dist(y, z) = 1

โ€ข for each ๐’› โˆˆ ๐’, there are at least ๐‘šโ€ฒ strings ๐’š โˆˆ ๐’€ with dist(y, z) = 1

Claim: Progress๐‘ก โˆ’ Progress๐‘ก+1 โ‰ค2

๐‘š๐‘šโ€ฒ|๐‘…| for all t.

Progress๐‘ก =

๐’š,๐’› โˆˆ๐‘…

๐œ“๐’š๐‘ก ๐œ“๐’›

๐‘กR = { (๐’š, ๐’›) : dist(y, z) = 1 } โŠ† ๐’€ ร— ๐’

Page 23: Lecture 20: The Adversary Methododonnell/quantum18/lecture20.pdfย ยท Lecture 20: The Adversary Method for Quantum Query Lower Bounds. Secret N-bit input string w You can query a coordinate

โ€ข for each ๐’š โˆˆ ๐’€, there are at least ๐‘š strings ๐’› โˆˆ ๐’ with dist(y, z) = 1

โ€ข for each ๐’› โˆˆ ๐’, there are at least ๐‘šโ€ฒ strings ๐’š โˆˆ ๐’€ with dist(y, z) = 1

Claim: Progress๐‘ก โˆ’ Progress๐‘ก+1 โ‰ค

Progress๐‘ก =

๐’š,๐’› โˆˆ๐‘…

๐œ“๐’š๐‘ก ๐œ“๐’›

๐‘กR = { (๐’š, ๐’›) : dist(y, z) = 1 } โŠ† ๐’€ ร— ๐’

for each ๐’š โˆˆ ๐’€, there are at least ๐‘š strings ๐’› โˆˆ ๐’ with dist(y, z) = 1

Hence ๐‘… โ‰ฅ ๐‘š |๐’€|

Similarly ๐‘… โ‰ฅ ๐‘šโ€ฒ|๐’|

So 2 ๐‘… โ‰ฅ ๐‘š|๐’€| + ๐‘šโ€ฒ|๐’|

Claim is even stronger if RHS is 1

๐‘š ๐‘šโ€ฒ(๐‘š ๐’€ +๐‘šโ€ฒ ๐’ )

๐‘šโ€ฒ

๐‘šโ€ฒ๐’€ +

๐‘šโ€ฒ

๐‘šโ€ฒ๐’=

2

๐‘š๐‘šโ€ฒ|๐‘…| for all t.

Page 24: Lecture 20: The Adversary Methododonnell/quantum18/lecture20.pdfย ยท Lecture 20: The Adversary Method for Quantum Query Lower Bounds. Secret N-bit input string w You can query a coordinate

Progress๐‘ก =

๐’š,๐’› โˆˆ๐‘…

๐œ“๐’š๐‘ก ๐œ“๐’›

๐‘กR = { (๐’š, ๐’›) : dist(y, z) = 1 } โŠ† ๐’€ ร— ๐’

Claim: Progress๐‘ก โˆ’ Progress๐‘ก+1 โ‰ค๐‘šโ€ฒ

๐‘šโ€ฒ๐’€ +

๐‘šโ€ฒ

๐‘šโ€ฒ๐’

Recall: Unitaries donโ€™t affect Progress, just the ๐‘„๐‘คยฑ queries.

Consider any pair ๐’š, ๐’› โˆˆ ๐‘…

Fix any t and t+1 (โ€œbeforeโ€ and โ€œafterโ€)

They differ on some coordinate j*

Page 25: Lecture 20: The Adversary Methododonnell/quantum18/lecture20.pdfย ยท Lecture 20: The Adversary Method for Quantum Query Lower Bounds. Secret N-bit input string w You can query a coordinate

Progress๐‘ก =

๐’š,๐’› โˆˆ๐‘…

๐œ“๐’š๐‘ก ๐œ“๐’›

๐‘กR = { (๐’š, ๐’›) : dist(y, z) = 1 } โŠ† ๐’€ ร— ๐’

Claim: Progress๐‘ก โˆ’ Progress๐‘ก+1 โ‰ค๐‘šโ€ฒ

๐‘šโ€ฒ๐’€ +

๐‘šโ€ฒ

๐‘šโ€ฒ๐’

Consider any pair ๐’š, ๐’› โˆˆ ๐‘…Fix any t and t+1 They differ on some coordinate j*

โ€œBeforeโ€: |๐œ“๐’š๐‘กโŸฉ

๐‘ˆ0

๐‘„๐’šยฑ

๐‘ˆ1

๐‘„๐’šยฑ ๐‘„๐’š

ยฑ

๐‘ˆ๐‘‡

โ€ขโ€ขโ€ข

โ€œAfterโ€: |๐œ“๐’š๐‘ก+1โŸฉ

Page 26: Lecture 20: The Adversary Methododonnell/quantum18/lecture20.pdfย ยท Lecture 20: The Adversary Method for Quantum Query Lower Bounds. Secret N-bit input string w You can query a coordinate

Progress๐‘ก =

๐’š,๐’› โˆˆ๐‘…

๐œ“๐’š๐‘ก ๐œ“๐’›

๐‘กR = { (๐’š, ๐’›) : dist(y, z) = 1 } โŠ† ๐’€ ร— ๐’

Claim: Progress๐‘ก โˆ’ Progress๐‘ก+1 โ‰ค๐‘šโ€ฒ

๐‘šโ€ฒ๐’€ +

๐‘šโ€ฒ

๐‘šโ€ฒ๐’

Consider any pair ๐’š, ๐’› โˆˆ ๐‘…Fix any t and t+1 They differ on some coordinate j*

โ€œBeforeโ€: |๐œ“๐’š๐‘กโŸฉ

๐‘„๐’šยฑ ๐‘„๐’š

ยฑ ๐‘„๐’šยฑโ€ข

โ€ขโ€ข

|๐œ“๐’š๐‘กโŸฉ |๐œ“๐’š

๐‘ก+1โŸฉ

โ€œAfterโ€: |๐œ“๐’š๐‘ก+1โŸฉ

Page 27: Lecture 20: The Adversary Methododonnell/quantum18/lecture20.pdfย ยท Lecture 20: The Adversary Method for Quantum Query Lower Bounds. Secret N-bit input string w You can query a coordinate

Progress๐‘ก =

๐’š,๐’› โˆˆ๐‘…

๐œ“๐’š๐‘ก ๐œ“๐’›

๐‘กR = { (๐’š, ๐’›) : dist(y, z) = 1 } โŠ† ๐’€ ร— ๐’

Claim: Progress๐‘ก โˆ’ Progress๐‘ก+1 โ‰ค๐‘šโ€ฒ

๐‘šโ€ฒ๐’€ +

๐‘šโ€ฒ

๐‘šโ€ฒ๐’

Consider any pair ๐’š, ๐’› โˆˆ ๐‘…Fix any t and t+1 They differ on some coordinate j*

โ€œBeforeโ€: |๐œ“๐’š๐‘กโŸฉ = 1 โŠ— stuff1 + 2 โŠ— stuff2 +โ‹ฏ+ ๐‘ โŠ— stuff๐‘

queryregister

workspaceregister

We have collected like terms based on the query register.

Let |๐œ™๐‘—โŸฉ be a unit vector

in the direction of (stuff๐‘—)

โ€œAfterโ€: |๐œ“๐’š๐‘ก+1โŸฉ

Page 28: Lecture 20: The Adversary Methododonnell/quantum18/lecture20.pdfย ยท Lecture 20: The Adversary Method for Quantum Query Lower Bounds. Secret N-bit input string w You can query a coordinate

Progress๐‘ก =

๐’š,๐’› โˆˆ๐‘…

๐œ“๐’š๐‘ก ๐œ“๐’›

๐‘กR = { (๐’š, ๐’›) : dist(y, z) = 1 } โŠ† ๐’€ ร— ๐’

Claim: Progress๐‘ก โˆ’ Progress๐‘ก+1 โ‰ค๐‘šโ€ฒ

๐‘šโ€ฒ๐’€ +

๐‘šโ€ฒ

๐‘šโ€ฒ๐’

Consider any pair ๐’š, ๐’› โˆˆ ๐‘…Fix any t and t+1 They differ on some coordinate j*

โ€œBeforeโ€: |๐œ“๐’š๐‘กโŸฉ = ๐›ผ1 1 โŠ— |๐œ™1โŸฉ + ๐›ผ2 2 โŠ— |๐œ™2โŸฉ + โ‹ฏ+ ๐›ผ๐‘ ๐‘ โŠ— |๐œ™๐‘โŸฉ

We have collected like terms based on the query register.

Let |๐œ™๐‘—โŸฉ be a unit vector

in the direction of (stuff๐‘—)

โ€œAfterโ€: |๐œ“๐’š๐‘ก+1โŸฉ

Page 29: Lecture 20: The Adversary Methododonnell/quantum18/lecture20.pdfย ยท Lecture 20: The Adversary Method for Quantum Query Lower Bounds. Secret N-bit input string w You can query a coordinate

Progress๐‘ก =

๐’š,๐’› โˆˆ๐‘…

๐œ“๐’š๐‘ก ๐œ“๐’›

๐‘กR = { (๐’š, ๐’›) : dist(y, z) = 1 } โŠ† ๐’€ ร— ๐’

Claim: Progress๐‘ก โˆ’ Progress๐‘ก+1 โ‰ค๐‘šโ€ฒ

๐‘šโ€ฒ๐’€ +

๐‘šโ€ฒ

๐‘šโ€ฒ๐’

Consider any pair ๐’š, ๐’› โˆˆ ๐‘…Fix any t and t+1 They differ on some coordinate j*

โ€œBeforeโ€: |๐œ“๐’š๐‘กโŸฉ = ๐›ผ1 1 โŠ— |๐œ™1โŸฉ + ๐›ผ2 2 โŠ— |๐œ™2โŸฉ + โ‹ฏ+ ๐›ผ๐‘ ๐‘ โŠ— |๐œ™๐‘โŸฉ Each |๐œ™๐‘—โŸฉ is unit,

and ฯƒ๐‘— ๐›ผ๐‘—2= 1.

โ€œAfterโ€: |๐œ“๐’š๐‘ก+1โŸฉ

Page 30: Lecture 20: The Adversary Methododonnell/quantum18/lecture20.pdfย ยท Lecture 20: The Adversary Method for Quantum Query Lower Bounds. Secret N-bit input string w You can query a coordinate

Progress๐‘ก =

๐’š,๐’› โˆˆ๐‘…

๐œ“๐’š๐‘ก ๐œ“๐’›

๐‘กR = { (๐’š, ๐’›) : dist(y, z) = 1 } โŠ† ๐’€ ร— ๐’

Claim: Progress๐‘ก โˆ’ Progress๐‘ก+1 โ‰ค๐‘šโ€ฒ

๐‘šโ€ฒ๐’€ +

๐‘šโ€ฒ

๐‘šโ€ฒ๐’

Consider any pair ๐’š, ๐’› โˆˆ ๐‘…Fix any t and t+1 They differ on some coordinate j*

โ€œBeforeโ€: |๐œ“๐’š๐‘กโŸฉ = ๐›ผ1 1 โŠ— |๐œ™1โŸฉ + ๐›ผ2 2 โŠ— |๐œ™2โŸฉ + โ‹ฏ+ ๐›ผ๐‘ ๐‘ โŠ— |๐œ™๐‘โŸฉ

๐‘„๐’šยฑ

= โˆ’1 ๐’š1๐›ผ1 1 โŠ— |๐œ™1โŸฉ + โˆ’1 ๐’š2๐›ผ2 2 โŠ— |๐œ™2โŸฉ + โ‹ฏ+ โˆ’1 ๐’š๐‘๐›ผ๐‘ ๐‘ โŠ— |๐œ™๐‘โŸฉ

The jth amplitude is multiplied by โˆ’1 ๐’š๐‘—

Each |๐œ™๐‘—โŸฉ is unit,

and ฯƒ๐‘— ๐›ผ๐‘—2= 1.

โ€œAfterโ€: |๐œ“๐’š๐‘ก+1โŸฉ

Page 31: Lecture 20: The Adversary Methododonnell/quantum18/lecture20.pdfย ยท Lecture 20: The Adversary Method for Quantum Query Lower Bounds. Secret N-bit input string w You can query a coordinate

Progress๐‘ก =

๐’š,๐’› โˆˆ๐‘…

๐œ“๐’š๐‘ก ๐œ“๐’›

๐‘กR = { (๐’š, ๐’›) : dist(y, z) = 1 } โŠ† ๐’€ ร— ๐’

Claim: Progress๐‘ก โˆ’ Progress๐‘ก+1 โ‰ค๐‘šโ€ฒ

๐‘šโ€ฒ๐’€ +

๐‘šโ€ฒ

๐‘šโ€ฒ๐’

Consider any pair ๐’š, ๐’› โˆˆ ๐‘…Fix any t and t+1 They differ on some coordinate j*

โ€œBeforeโ€: |๐œ“๐’š๐‘กโŸฉ

โ€œAfterโ€: |๐œ“๐’š๐‘ก+1โŸฉ

= ๐›ผ1 1 โŠ— |๐œ™1โŸฉ + ๐›ผ2 2 โŠ— |๐œ™2โŸฉ + โ‹ฏ+ ๐›ผ๐‘ ๐‘ โŠ— |๐œ™๐‘โŸฉ

= โˆ’1 ๐’š1๐›ผ1 1 โŠ— |๐œ™1โŸฉ + โˆ’1 ๐’š2๐›ผ2 2 โŠ— |๐œ™2โŸฉ + โ‹ฏ+ โˆ’1 ๐’š๐‘๐›ผ๐‘ ๐‘ โŠ— |๐œ™๐‘โŸฉ

Each |๐œ™๐‘—โŸฉ is unit,

and ฯƒ๐‘— ๐›ผ๐‘—2= 1.= ๐›ฝ1 1 โŠ— ๐œ’1 + ๐›ฝ2 2 โŠ— ๐œ’2 +โ‹ฏ+ ๐›ฝ๐‘ ๐‘ โŠ— |๐œ’๐‘โŸฉ

= โˆ’1 ๐’›1๐›ฝ1 1 โŠ— |๐œ’1โŸฉ + โˆ’1 ๐’›2 ๐›ฝ2 2 โŠ— |๐œ’2โŸฉ + โ‹ฏ+ โˆ’1 ๐’›๐‘๐›ฝ๐‘ ๐‘ โŠ— |๐œ’๐‘โŸฉ

|๐œ“๐’›๐‘กโŸฉ

|๐œ“๐’›๐‘ก+1โŸฉ

Page 32: Lecture 20: The Adversary Methododonnell/quantum18/lecture20.pdfย ยท Lecture 20: The Adversary Method for Quantum Query Lower Bounds. Secret N-bit input string w You can query a coordinate

Progress๐‘ก =

๐’š,๐’› โˆˆ๐‘…

๐œ“๐’š๐‘ก ๐œ“๐’›

๐‘กR = { (๐’š, ๐’›) : dist(y, z) = 1 } โŠ† ๐’€ ร— ๐’

Claim: Progress๐‘ก โˆ’ Progress๐‘ก+1 โ‰ค๐‘šโ€ฒ

๐‘šโ€ฒ๐’€ +

๐‘šโ€ฒ

๐‘šโ€ฒ๐’

Consider any pair ๐’š, ๐’› โˆˆ ๐‘…Fix any t and t+1 They differ on some coordinate j*

โ€œBeforeโ€: |๐œ“๐’š๐‘กโŸฉ

โ€œAfterโ€: |๐œ“๐’š๐‘ก+1โŸฉ

= ๐›ผ1 1 โŠ— |๐œ™1โŸฉ + ๐›ผ2 2 โŠ— |๐œ™2โŸฉ + โ‹ฏ+ ๐›ผ๐‘ ๐‘ โŠ— |๐œ™๐‘โŸฉ

= โˆ’1 ๐’š1๐›ผ1 1 โŠ— |๐œ™1โŸฉ + โˆ’1 ๐’š2๐›ผ2 2 โŠ— |๐œ™2โŸฉ + โ‹ฏ+ โˆ’1 ๐’š๐‘๐›ผ๐‘ ๐‘ โŠ— |๐œ™๐‘โŸฉ

Each |๐œ™๐‘—โŸฉ is unit,

and ฯƒ๐‘— ๐›ผ๐‘—2= 1.= ๐›ฝ1 1 โŠ— ๐œ’1 + ๐›ฝ2 2 โŠ— ๐œ’2 +โ‹ฏ+ ๐›ฝ๐‘ ๐‘ โŠ— |๐œ’๐‘โŸฉ

= โˆ’1 ๐’›1๐›ฝ1 1 โŠ— |๐œ’1โŸฉ + โˆ’1 ๐’›2 ๐›ฝ2 2 โŠ— |๐œ’2โŸฉ + โ‹ฏ+ โˆ’1 ๐’›๐‘๐›ฝ๐‘ ๐‘ โŠ— |๐œ’๐‘โŸฉ

|๐œ“๐’›๐‘กโŸฉ

|๐œ“๐’›๐‘ก+1โŸฉ

โŸจ๐œ“๐‘ฆ๐‘ก |๐œ“๐’›

๐‘กโŸฉ = ๐›ผ1๐›ฝ1โŸจ๐œ™1 ๐œ’1 + ๐›ผ2๐›ฝ2โŸจ๐œ™2 ๐œ’2 +โ‹ฏ+ ๐›ผ๐‘๐›ฝ๐‘โŸจ๐œ™๐‘|๐œ’๐‘โŸฉ

These signs are all the same โ€” except for in coordinate j*

Page 33: Lecture 20: The Adversary Methododonnell/quantum18/lecture20.pdfย ยท Lecture 20: The Adversary Method for Quantum Query Lower Bounds. Secret N-bit input string w You can query a coordinate

Progress๐‘ก =

๐’š,๐’› โˆˆ๐‘…

๐œ“๐’š๐‘ก ๐œ“๐’›

๐‘กR = { (๐’š, ๐’›) : dist(y, z) = 1 } โŠ† ๐’€ ร— ๐’

Claim: Progress๐‘ก โˆ’ Progress๐‘ก+1 โ‰ค๐‘šโ€ฒ

๐‘šโ€ฒ๐’€ +

๐‘šโ€ฒ

๐‘šโ€ฒ๐’

Consider any pair ๐’š, ๐’› โˆˆ ๐‘…Fix any t and t+1 They differ on some coordinate j*

โ€œBeforeโ€: |๐œ“๐’š๐‘กโŸฉ

โ€œAfterโ€: |๐œ“๐’š๐‘ก+1โŸฉ

= ๐›ผ1 1 โŠ— |๐œ™1โŸฉ + ๐›ผ2 2 โŠ— |๐œ™2โŸฉ + โ‹ฏ+ ๐›ผ๐‘ ๐‘ โŠ— |๐œ™๐‘โŸฉ

= โˆ’1 ๐’š1๐›ผ1 1 โŠ— |๐œ™1โŸฉ + โˆ’1 ๐’š2๐›ผ2 2 โŠ— |๐œ™2โŸฉ + โ‹ฏ+ โˆ’1 ๐’š๐‘๐›ผ๐‘ ๐‘ โŠ— |๐œ™๐‘โŸฉ

Each |๐œ™๐‘—โŸฉ is unit,

and ฯƒ๐‘— ๐›ผ๐‘—2= 1.= ๐›ฝ1 1 โŠ— ๐œ’1 + ๐›ฝ2 2 โŠ— ๐œ’2 +โ‹ฏ+ ๐›ฝ๐‘ ๐‘ โŠ— |๐œ’๐‘โŸฉ

= โˆ’1 ๐’›1๐›ฝ1 1 โŠ— |๐œ’1โŸฉ + โˆ’1 ๐’›2 ๐›ฝ2 2 โŠ— |๐œ’2โŸฉ + โ‹ฏ+ โˆ’1 ๐’›๐‘๐›ฝ๐‘ ๐‘ โŠ— |๐œ’๐‘โŸฉ

|๐œ“๐’›๐‘กโŸฉ

|๐œ“๐’›๐‘ก+1โŸฉ

โŸจ๐œ“๐‘ฆ๐‘ก |๐œ“๐’›

๐‘กโŸฉ = ๐›ผ1๐›ฝ1โŸจ๐œ™1 ๐œ’1 + ๐›ผ2๐›ฝ2โŸจ๐œ™2 ๐œ’2 +โ‹ฏ+ ๐›ผ๐‘๐›ฝ๐‘โŸจ๐œ™๐‘|๐œ’๐‘โŸฉ

โŸจ๐œ“๐‘ฆ๐‘ก+1|๐œ“๐’›

๐‘ก+1โŸฉ = ๐›ผ1๐›ฝ1โŸจ๐œ™1 ๐œ’1 + ๐›ผ2๐›ฝ2โŸจ๐œ™2 ๐œ’2 +โ‹ฏโˆ’ ๐›ผ๐‘—โˆ—๐›ฝ๐‘—โˆ— ๐œ™๐‘—โˆ— ๐œ’๐‘—โˆ— +โ‹ฏ+ ๐›ผ๐‘๐›ฝ๐‘โŸจ๐œ™๐‘|๐œ’๐‘โŸฉ

Page 34: Lecture 20: The Adversary Methododonnell/quantum18/lecture20.pdfย ยท Lecture 20: The Adversary Method for Quantum Query Lower Bounds. Secret N-bit input string w You can query a coordinate

Progress๐‘ก =

๐’š,๐’› โˆˆ๐‘…

๐œ“๐’š๐‘ก ๐œ“๐’›

๐‘กR = { (๐’š, ๐’›) : dist(y, z) = 1 } โŠ† ๐’€ ร— ๐’

Claim: Progress๐‘ก โˆ’ Progress๐‘ก+1 โ‰ค๐‘šโ€ฒ

๐‘šโ€ฒ๐’€ +

๐‘šโ€ฒ

๐‘šโ€ฒ๐’

Consider any pair ๐’š, ๐’› โˆˆ ๐‘…Fix any t and t+1 They differ on some coordinate j*

โ€œBeforeโ€:

โ€œAfterโ€:

Each |๐œ™๐‘—โŸฉ is unit,

and ฯƒ๐‘— ๐›ผ๐‘—2= 1.

โŸจ๐œ“๐‘ฆ๐‘ก |๐œ“๐’›

๐‘กโŸฉ = ๐›ผ1๐›ฝ1โŸจ๐œ™1 ๐œ’1 + ๐›ผ2๐›ฝ2โŸจ๐œ™2 ๐œ’2 +โ‹ฏ+ ๐›ผ๐‘๐›ฝ๐‘โŸจ๐œ™๐‘|๐œ’๐‘โŸฉ

โŸจ๐œ“๐‘ฆ๐‘ก+1|๐œ“๐’›

๐‘ก+1โŸฉ = ๐›ผ1๐›ฝ1โŸจ๐œ™1 ๐œ’1 + ๐›ผ2๐›ฝ2โŸจ๐œ™2 ๐œ’2 +โ‹ฏโˆ’ ๐›ผ๐‘—โˆ—๐›ฝ๐‘—โˆ— ๐œ™๐‘—โˆ— ๐œ’๐‘—โˆ— +โ‹ฏ+ ๐›ผ๐‘๐›ฝ๐‘โŸจ๐œ™๐‘|๐œ’๐‘โŸฉ

Page 35: Lecture 20: The Adversary Methododonnell/quantum18/lecture20.pdfย ยท Lecture 20: The Adversary Method for Quantum Query Lower Bounds. Secret N-bit input string w You can query a coordinate

Progress๐‘ก =

๐’š,๐’› โˆˆ๐‘…

๐œ“๐’š๐‘ก ๐œ“๐’›

๐‘กR = { (๐’š, ๐’›) : dist(y, z) = 1 } โŠ† ๐’€ ร— ๐’

Claim: Progress๐‘ก โˆ’ Progress๐‘ก+1 โ‰ค๐‘šโ€ฒ

๐‘šโ€ฒ๐’€ +

๐‘šโ€ฒ

๐‘šโ€ฒ๐’

Consider any pair ๐’š, ๐’› โˆˆ ๐‘…Fix any t and t+1 They differ on some coordinate j*

โ€œBeforeโ€:

โ€œAfterโ€:

Each |๐œ™๐‘—โŸฉ is unit,

and ฯƒ๐‘— ๐›ผ๐‘—2= 1.

โŸจ๐œ“๐‘ฆ๐‘ก+1|๐œ“๐’›

๐‘ก+1โŸฉ = ๐›ผ1๐›ฝ1โŸจ๐œ™1 ๐œ’1 + ๐›ผ2๐›ฝ2โŸจ๐œ™2 ๐œ’2 +โ‹ฏโˆ’ ๐›ผ๐‘—โˆ—๐›ฝ๐‘—โˆ— ๐œ™๐‘—โˆ— ๐œ’๐‘—โˆ— +โ‹ฏ+ ๐›ผ๐‘๐›ฝ๐‘โŸจ๐œ™๐‘|๐œ’๐‘โŸฉ

โŸจ๐œ“๐‘ฆ๐‘ก |๐œ“๐’›

๐‘กโŸฉ = ๐›ผ1๐›ฝ1โŸจ๐œ™1 ๐œ’1 + ๐›ผ2๐›ฝ2โŸจ๐œ™2 ๐œ’2 +โ‹ฏ+ ๐›ผ๐‘๐›ฝ๐‘โŸจ๐œ™๐‘|๐œ’๐‘โŸฉ

๐œ“๐‘ฆ๐‘ก ๐œ“๐’›

๐‘ก โˆ’ ๐œ“๐‘ฆ๐‘ก+1 ๐œ“๐’›

๐‘ก+1 = 2 ๐›ผ๐‘—โˆ—๐›ฝ๐‘—โˆ— ๐œ™๐‘—โˆ— ๐œ’๐‘—โˆ— ๐œ“๐‘ฆ๐‘ก ๐œ“๐’›

๐‘ก โˆ’ ๐œ“๐‘ฆ๐‘ก+1 ๐œ“๐’›

๐‘ก+1 โ‰ค 2 ๐›ผ๐‘—โˆ— โˆ™ ๐›ฝ๐‘—โˆ—โ‡’

Page 36: Lecture 20: The Adversary Methododonnell/quantum18/lecture20.pdfย ยท Lecture 20: The Adversary Method for Quantum Query Lower Bounds. Secret N-bit input string w You can query a coordinate

Progress๐‘ก =

๐’š,๐’› โˆˆ๐‘…

๐œ“๐’š๐‘ก ๐œ“๐’›

๐‘กR = { (๐’š, ๐’›) : dist(y, z) = 1 } โŠ† ๐’€ ร— ๐’

Claim: Progress๐‘ก โˆ’ Progress๐‘ก+1 โ‰ค๐‘šโ€ฒ

๐‘šโ€ฒ๐’€ +

๐‘šโ€ฒ

๐‘šโ€ฒ๐’

Consider any pair ๐’š, ๐’› โˆˆ ๐‘…Fix any t and t+1 They differ on some coordinate j*

โ€œBeforeโ€:

โ€œAfterโ€:

Each |๐œ™๐‘—โŸฉ is unit,

and ฯƒ๐‘— ๐›ผ๐‘—2= 1.

โŸจ๐œ“๐‘ฆ๐‘ก+1|๐œ“๐’›

๐‘ก+1โŸฉ = ๐›ผ1๐›ฝ1โŸจ๐œ™1 ๐œ’1 + ๐›ผ2๐›ฝ2โŸจ๐œ™2 ๐œ’2 +โ‹ฏโˆ’ ๐›ผ๐‘—โˆ—๐›ฝ๐‘—โˆ— ๐œ™๐‘—โˆ— ๐œ’๐‘—โˆ— +โ‹ฏ+ ๐›ผ๐‘๐›ฝ๐‘โŸจ๐œ™๐‘|๐œ’๐‘โŸฉ

โŸจ๐œ“๐‘ฆ๐‘ก |๐œ“๐’›

๐‘กโŸฉ = ๐›ผ1๐›ฝ1โŸจ๐œ™1 ๐œ’1 + ๐›ผ2๐›ฝ2โŸจ๐œ™2 ๐œ’2 +โ‹ฏ+ ๐›ผ๐‘๐›ฝ๐‘โŸจ๐œ™๐‘|๐œ’๐‘โŸฉ

๐œ“๐‘ฆ๐‘ก ๐œ“๐’›

๐‘ก โˆ’ ๐œ“๐‘ฆ๐‘ก+1 ๐œ“๐’›

๐‘ก+1 โ‰ค

(triangle inequality)

๐œ“๐‘ฆ๐‘ก ๐œ“๐’›

๐‘ก โˆ’ ๐œ“๐‘ฆ๐‘ก+1 ๐œ“๐’›

๐‘ก+1 โ‰ค 2 ๐›ผ๐‘—โˆ— โˆ™ ๐›ฝ๐‘—โˆ—

Page 37: Lecture 20: The Adversary Methododonnell/quantum18/lecture20.pdfย ยท Lecture 20: The Adversary Method for Quantum Query Lower Bounds. Secret N-bit input string w You can query a coordinate

Progress๐‘ก =

๐’š,๐’› โˆˆ๐‘…

๐œ“๐’š๐‘ก ๐œ“๐’›

๐‘กR = { (๐’š, ๐’›) : dist(y, z) = 1 } โŠ† ๐’€ ร— ๐’

Claim: Progress๐‘ก โˆ’ Progress๐‘ก+1 โ‰ค๐‘šโ€ฒ

๐‘šโ€ฒ๐’€ +

๐‘šโ€ฒ

๐‘šโ€ฒ๐’

Consider any pair ๐’š, ๐’› โˆˆ ๐‘…Fix any t and t+1 They differ on some coordinate j*

โ€œBeforeโ€:

โ€œAfterโ€:

Each |๐œ™๐‘—โŸฉ is unit,

and ฯƒ๐‘— ๐›ผ๐‘—2= 1.

โŸจ๐œ“๐‘ฆ๐‘ก+1|๐œ“๐’›

๐‘ก+1โŸฉ = ๐›ผ1๐›ฝ1โŸจ๐œ™1 ๐œ’1 + ๐›ผ2๐›ฝ2โŸจ๐œ™2 ๐œ’2 +โ‹ฏโˆ’ ๐›ผ๐‘—โˆ—๐›ฝ๐‘—โˆ— ๐œ™๐‘—โˆ— ๐œ’๐‘—โˆ— +โ‹ฏ+ ๐›ผ๐‘๐›ฝ๐‘โŸจ๐œ™๐‘|๐œ’๐‘โŸฉ

โŸจ๐œ“๐‘ฆ๐‘ก |๐œ“๐’›

๐‘กโŸฉ = ๐›ผ1๐›ฝ1โŸจ๐œ™1 ๐œ’1 + ๐›ผ2๐›ฝ2โŸจ๐œ™2 ๐œ’2 +โ‹ฏ+ ๐›ผ๐‘๐›ฝ๐‘โŸจ๐œ™๐‘|๐œ’๐‘โŸฉ

๐œ“๐‘ฆ๐‘ก ๐œ“๐’›

๐‘ก โˆ’ ๐œ“๐‘ฆ๐‘ก+1 ๐œ“๐’›

๐‘ก+1 โ‰ค 2 ๐›ผ๐‘—โˆ— โˆ™ ๐›ฝ๐‘—โˆ—

Page 38: Lecture 20: The Adversary Methododonnell/quantum18/lecture20.pdfย ยท Lecture 20: The Adversary Method for Quantum Query Lower Bounds. Secret N-bit input string w You can query a coordinate

Progress๐‘ก =

๐’š,๐’› โˆˆ๐‘…

๐œ“๐’š๐‘ก ๐œ“๐’›

๐‘กR = { (๐’š, ๐’›) : dist(y, z) = 1 } โŠ† ๐’€ ร— ๐’

Claim: Progress๐‘ก โˆ’ Progress๐‘ก+1 โ‰ค๐‘šโ€ฒ

๐‘šโ€ฒ๐’€ +

๐‘šโ€ฒ

๐‘šโ€ฒ๐’

Consider any pair ๐’š, ๐’› โˆˆ ๐‘…Fix any t and t+1 They differ on some coordinate j*

๐œ“๐‘ฆ๐‘ก ๐œ“๐’›

๐‘ก โˆ’ ๐œ“๐‘ฆ๐‘ก+1 ๐œ“๐’›

๐‘ก+1 โ‰ค 2 ๐›ผ๐‘—โˆ— โˆ™ ๐›ฝ๐‘—โˆ—

A math trick: For any real ๐‘Ž, ๐‘, and โ„Ž > 0: 2๐‘Ž๐‘ โ‰ค โ„Ž๐‘Ž2 + ฮค1 โ„Ž ๐‘2

Proof 1: AM-GM inequality: ๐‘Ž๐‘ is the geometric mean of โ„Ž๐‘Ž2 and ฮค1 โ„Ž ๐‘2

Proof 2: Certainly: 0 โ‰ค โ„Ž ๐‘Ž โˆ’ ฮค1 โ„Ž ๐‘2

Expanding: 0 โ‰ค โ„Ž๐‘Ž2 + ฮค1 โ„Ž ๐‘2 โˆ’ 2๐‘Ž๐‘

Page 39: Lecture 20: The Adversary Methododonnell/quantum18/lecture20.pdfย ยท Lecture 20: The Adversary Method for Quantum Query Lower Bounds. Secret N-bit input string w You can query a coordinate

Progress๐‘ก =

๐’š,๐’› โˆˆ๐‘…

๐œ“๐’š๐‘ก ๐œ“๐’›

๐‘กR = { (๐’š, ๐’›) : dist(y, z) = 1 } โŠ† ๐’€ ร— ๐’

Claim: Progress๐‘ก โˆ’ Progress๐‘ก+1 โ‰ค๐‘šโ€ฒ

๐‘šโ€ฒ๐’€ +

๐‘šโ€ฒ

๐‘šโ€ฒ๐’

Consider any pair ๐’š, ๐’› โˆˆ ๐‘…Fix any t and t+1 They differ on some coordinate j*

๐œ“๐‘ฆ๐‘ก ๐œ“๐’›

๐‘ก โˆ’ ๐œ“๐‘ฆ๐‘ก+1 ๐œ“๐’›

๐‘ก+1 โ‰ค

A math trick: For any real ๐‘Ž, ๐‘, and โ„Ž > 0: 2๐‘Ž๐‘ โ‰ค โ„Ž๐‘Ž2 + ฮค1 โ„Ž ๐‘2

Apply this above, with ๐‘Ž = ๐›ผ๐‘—โˆ— , ๐‘ = ๐›ฝ๐‘—โˆ— , โ„Ž =๐‘šโ€ฒ

๐‘šโ€ฒ

2 ๐›ผ๐‘—โˆ— โˆ™ ๐›ฝ๐‘—โˆ—

Page 40: Lecture 20: The Adversary Methododonnell/quantum18/lecture20.pdfย ยท Lecture 20: The Adversary Method for Quantum Query Lower Bounds. Secret N-bit input string w You can query a coordinate

Progress๐‘ก =

๐’š,๐’› โˆˆ๐‘…

๐œ“๐’š๐‘ก ๐œ“๐’›

๐‘กR = { (๐’š, ๐’›) : dist(y, z) = 1 } โŠ† ๐’€ ร— ๐’

Claim: Progress๐‘ก โˆ’ Progress๐‘ก+1 โ‰ค๐‘šโ€ฒ

๐‘šโ€ฒ๐’€ +

๐‘šโ€ฒ

๐‘šโ€ฒ๐’

Consider any pair ๐’š, ๐’› โˆˆ ๐‘…Fix any t and t+1 They differ on some coordinate j*

๐œ“๐‘ฆ๐‘ก ๐œ“๐’›

๐‘ก โˆ’ ๐œ“๐‘ฆ๐‘ก+1 ๐œ“๐’›

๐‘ก+1 โ‰ค

A math trick: For any real ๐‘Ž, ๐‘, and โ„Ž > 0: 2๐‘Ž๐‘ โ‰ค โ„Ž๐‘Ž2 + ฮค1 โ„Ž ๐‘2

Apply this above, with ๐‘Ž = ๐›ผ๐‘—โˆ— , ๐‘ = ๐›ฝ๐‘—โˆ— , โ„Ž =๐‘šโ€ฒ

๐‘šโ€ฒ

๐‘šโ€ฒ

๐‘šโ€ฒ ๐›ผ๐‘—โˆ—2

+๐‘šโ€ฒ

๐‘šโ€ฒ ๐›ฝ๐‘—โˆ—2

Page 41: Lecture 20: The Adversary Methododonnell/quantum18/lecture20.pdfย ยท Lecture 20: The Adversary Method for Quantum Query Lower Bounds. Secret N-bit input string w You can query a coordinate

Progress๐‘ก =

๐’š,๐’› โˆˆ๐‘…

๐œ“๐’š๐‘ก ๐œ“๐’›

๐‘กR = { (๐’š, ๐’›) : dist(y, z) = 1 } โŠ† ๐’€ ร— ๐’

Claim: Progress๐‘ก โˆ’ Progress๐‘ก+1 โ‰ค๐‘šโ€ฒ

๐‘šโ€ฒ๐’€ +

๐‘šโ€ฒ

๐‘šโ€ฒ๐’

Consider any pair ๐’š, ๐’› โˆˆ ๐‘…Fix any t and t+1 They differ on some coordinate j*

๐œ“๐‘ฆ๐‘ก ๐œ“๐’›

๐‘ก โˆ’ ๐œ“๐‘ฆ๐‘ก+1 ๐œ“๐’›

๐‘ก+1 โ‰ค

Finally, coordinate j* really depends on the pair ๐’š, ๐’› , so letโ€™s write it as

j* ๐’š, ๐’›

๐‘šโ€ฒ

๐‘šโ€ฒ ๐›ผ๐‘—โˆ—2

+๐‘šโ€ฒ

๐‘šโ€ฒ ๐›ฝ๐‘—โˆ—2

Page 42: Lecture 20: The Adversary Methododonnell/quantum18/lecture20.pdfย ยท Lecture 20: The Adversary Method for Quantum Query Lower Bounds. Secret N-bit input string w You can query a coordinate

Progress๐‘ก =

๐’š,๐’› โˆˆ๐‘…

๐œ“๐’š๐‘ก ๐œ“๐’›

๐‘กR = { (๐’š, ๐’›) : dist(y, z) = 1 } โŠ† ๐’€ ร— ๐’

Claim: Progress๐‘ก โˆ’ Progress๐‘ก+1 โ‰ค๐‘šโ€ฒ

๐‘šโ€ฒ๐’€ +

๐‘šโ€ฒ

๐‘šโ€ฒ๐’

Consider any pair ๐’š, ๐’› โˆˆ ๐‘…Fix any t and t+1 They differ on some coordinate j*

๐œ“๐‘ฆ๐‘ก ๐œ“๐’›

๐‘ก โˆ’ ๐œ“๐‘ฆ๐‘ก+1 ๐œ“๐’›

๐‘ก+1 โ‰ค

Finally, coordinate j* really depends on the pair ๐’š, ๐’› , so letโ€™s write it as

j* ๐’š, ๐’›

๐‘šโ€ฒ

๐‘šโ€ฒ ๐›ผ๐‘—โˆ— ๐’š,๐’›2

+๐‘šโ€ฒ

๐‘šโ€ฒ ๐›ฝ๐‘—โˆ— ๐’š,๐’›2

Page 43: Lecture 20: The Adversary Methododonnell/quantum18/lecture20.pdfย ยท Lecture 20: The Adversary Method for Quantum Query Lower Bounds. Secret N-bit input string w You can query a coordinate

Progress๐‘ก =

๐’š,๐’› โˆˆ๐‘…

๐œ“๐’š๐‘ก ๐œ“๐’›

๐‘กR = { (๐’š, ๐’›) : dist(y, z) = 1 } โŠ† ๐’€ ร— ๐’

Claim: Progress๐‘ก โˆ’ Progress๐‘ก+1 โ‰ค๐‘šโ€ฒ

๐‘šโ€ฒ๐’€ +

๐‘šโ€ฒ

๐‘šโ€ฒ๐’

Consider any pair ๐’š, ๐’› โˆˆ ๐‘…Fix any t and t+1 They differ on some coordinate j* ๐’š, ๐’›

๐œ“๐‘ฆ๐‘ก ๐œ“๐’›

๐‘ก โˆ’ ๐œ“๐‘ฆ๐‘ก+1 ๐œ“๐’›

๐‘ก+1 โ‰ค๐‘šโ€ฒ

๐‘šโ€ฒ ๐›ผ๐‘—โˆ— ๐’š,๐’›2

+๐‘šโ€ฒ

๐‘šโ€ฒ ๐›ฝ๐‘—โˆ— ๐’š,๐’›2

Also, to be scrupulous about notation, the ๐›ผ๐‘— โ€™s come from |๐œ“๐’š๐‘กโŸฉ, and thus depend on y.

Similarly, the ๐›ฝ๐‘— โ€™s depend on z.

Page 44: Lecture 20: The Adversary Methododonnell/quantum18/lecture20.pdfย ยท Lecture 20: The Adversary Method for Quantum Query Lower Bounds. Secret N-bit input string w You can query a coordinate

Progress๐‘ก =

๐’š,๐’› โˆˆ๐‘…

๐œ“๐’š๐‘ก ๐œ“๐’›

๐‘กR = { (๐’š, ๐’›) : dist(y, z) = 1 } โŠ† ๐’€ ร— ๐’

Claim: Progress๐‘ก โˆ’ Progress๐‘ก+1 โ‰ค๐‘šโ€ฒ

๐‘šโ€ฒ๐’€ +

๐‘šโ€ฒ

๐‘šโ€ฒ๐’

Consider any pair ๐’š, ๐’› โˆˆ ๐‘…Fix any t and t+1 They differ on some coordinate j* ๐’š, ๐’›

๐œ“๐‘ฆ๐‘ก ๐œ“๐’›

๐‘ก โˆ’ ๐œ“๐‘ฆ๐‘ก+1 ๐œ“๐’›

๐‘ก+1 โ‰ค๐‘šโ€ฒ

๐‘šโ€ฒ ๐›ผ๐‘—โˆ— ๐’š,๐’›๐’š 2

+๐‘šโ€ฒ

๐‘šโ€ฒ ๐›ฝ๐‘—โˆ— ๐’š,๐’›๐’›

2

Summing overall ๐’š, ๐’› โˆˆ ๐‘…:

Progress๐‘ก โˆ’ Progress๐‘ก+1 โ‰ค

๐’š,๐’› โˆˆ๐‘…

๐‘šโ€ฒ

๐‘šโ€ฒ๐›ผ๐‘—โˆ— ๐’š,๐’›

๐’š 2+

๐’š,๐’› โˆˆ๐‘…

๐‘šโ€ฒ

๐‘šโ€ฒ๐›ฝ๐‘—โˆ— ๐’š,๐’›

๐’›2

Final claim:

๐’š,๐’› โˆˆ๐‘…

๐›ผ๐‘—โˆ— ๐’š,๐’›๐’š 2

โ‰ค |๐’€| (and similarly for the second term, completing the proof)

Page 45: Lecture 20: The Adversary Methododonnell/quantum18/lecture20.pdfย ยท Lecture 20: The Adversary Method for Quantum Query Lower Bounds. Secret N-bit input string w You can query a coordinate

Progress๐‘ก =

๐’š,๐’› โˆˆ๐‘…

๐œ“๐’š๐‘ก ๐œ“๐’›

๐‘กR = { (๐’š, ๐’›) : dist(y, z) = 1 } โŠ† ๐’€ ร— ๐’

Claim: Progress๐‘ก โˆ’ Progress๐‘ก+1 โ‰ค๐‘šโ€ฒ

๐‘šโ€ฒ๐’€ +

๐‘šโ€ฒ

๐‘šโ€ฒ๐’

Final claim:

๐’š,๐’› โˆˆ๐‘…

๐›ผ๐‘—โˆ— ๐’š,๐’›๐’š 2

โ‰ค |๐’€|

Consider any pair ๐’š, ๐’› โˆˆ ๐‘… They differ on some coordinate j* ๐’š, ๐’›Fix any t and t+1

For each ๐’š โˆˆ ๐’€, if you go over all z such that ๐’š, ๐’› โˆˆ ๐‘…, the associated j* ๐’š, ๐’› are distinct.

So for each ๐’š โˆˆ ๐’€, youโ€™re summing a subset of all possible ๐›ผ๐‘—๐’š 2

. Which is at most 1.

So indeed the overall sum is at most |๐’€|.

Page 46: Lecture 20: The Adversary Methododonnell/quantum18/lecture20.pdfย ยท Lecture 20: The Adversary Method for Quantum Query Lower Bounds. Secret N-bit input string w You can query a coordinate

[Ambainis โ€™00]Super-Basic Adversary Method:

For ๐œ‘ = (YES, NO), suppose ๐’€ โŠ† YES, ๐’ โŠ† NO are such that:

โ€ข for each ๐’š โˆˆ ๐’€, there are at least ๐‘š strings ๐’› โˆˆ ๐’ with dist(y, z) = 1

โ€ข for each ๐’› โˆˆ ๐’, there are at least ๐‘šโ€ฒ strings ๐’š โˆˆ ๐’€ with dist(y, z) = 1

Then Q(๐œ‘), the quantum query complexity of ๐œ‘, is โ‰ณ ๐‘š๐‘šโ€ฒ.

Page 47: Lecture 20: The Adversary Methododonnell/quantum18/lecture20.pdfย ยท Lecture 20: The Adversary Method for Quantum Query Lower Bounds. Secret N-bit input string w You can query a coordinate

[Ambainis โ€™00]Super-Basic Adversary Method:

For ๐œ‘ = (YES, NO), suppose ๐’€ โŠ† YES, ๐’ โŠ† NO are such that:

โ€ข for each ๐’š โˆˆ ๐’€, there are at least ๐‘š strings ๐’› โˆˆ ๐’ with dist(y, z) = 1

โ€ข for each ๐’› โˆˆ ๐’, there are at least ๐‘šโ€ฒ strings ๐’š โˆˆ ๐’€ with dist(y, z) = 1

Then Q(๐œ‘), the quantum query complexity of ๐œ‘, is โ‰ณ ๐‘š๐‘šโ€ฒ.

Page 48: Lecture 20: The Adversary Methododonnell/quantum18/lecture20.pdfย ยท Lecture 20: The Adversary Method for Quantum Query Lower Bounds. Secret N-bit input string w You can query a coordinate

[Ambainis โ€™00] Basic Adversary Method:

For ๐œ‘ = (YES, NO), let ๐’€ โŠ† YES, ๐’ โŠ† NO.

Let ๐‘… โŠ† ๐’€ ร— ๐’ be a set of โ€œhard-to-distinguishโ€ pairs, such that:

โ€ข for each ๐’š โˆˆ ๐’€, there are at least ๐‘š strings ๐’› โˆˆ ๐’ with ๐’š, ๐’› โˆˆ ๐‘…

โ€ข for each ๐’› โˆˆ ๐’, there are at least ๐‘šโ€ฒ strings ๐’š โˆˆ ๐’€ with ๐’š, ๐’› โˆˆ ๐‘…

Also, for each coordinate j, define Rj = ๐’š, ๐’› โˆˆ ๐‘… โˆถ ๐’š๐‘— โ‰  ๐’›๐‘—

(namely, all the pairs distinguishable by querying coordinate j).

Assume:

โ€ข for each ๐’š โˆˆ ๐’€ and j, there are at most โ„“ strings ๐’› โˆˆ ๐’ with ๐’š, ๐’› โˆˆ ๐‘…๐‘—

โ€ข for each ๐’› โˆˆ ๐’ and j, there are at most โ„“โ€ฒ strings ๐’š โˆˆ ๐’€ with ๐’š, ๐’› โˆˆ ๐‘…๐‘—

Then Q(๐œ‘), the quantum query complexity of ๐œ‘, is โ‰ณ ฮค๐‘š ๐‘šโ€ฒ โ„“ โ„“โ€ฒ.

Page 49: Lecture 20: The Adversary Methododonnell/quantum18/lecture20.pdfย ยท Lecture 20: The Adversary Method for Quantum Query Lower Bounds. Secret N-bit input string w You can query a coordinate

Proof: Exercise!

(Only tiny modifications needed to the proof we saw.)

Exercise #2: Recall that Grover Search only needs โ‰ฒ ฮค๐‘ ๐‘˜ queries to find a 1if itโ€™s promised there are at least k 1โ€™s. (Assume ๐‘˜ โ‰ค ฮค๐‘ 2.)

Use the Basic Adversary Method to show โ‰ณ ฮค๐‘ ๐‘˜ queries are necessary for the promise problem:

๐œ‘ = โ€œdecide if w has no 1โ€™s, or at least k 1โ€™sโ€.

Page 50: Lecture 20: The Adversary Methododonnell/quantum18/lecture20.pdfย ยท Lecture 20: The Adversary Method for Quantum Query Lower Bounds. Secret N-bit input string w You can query a coordinate

Basic Adversary Method:

For ๐œ‘ = (YES, NO), let ๐’€ โŠ† YES, ๐’ โŠ† NO.

Let ๐‘… โŠ† ๐’€ ร— ๐’ be a set of โ€œhard-to-distinguishโ€ pairs, such that:

โ€ข for each ๐’š โˆˆ ๐’€, there are at least ๐‘š strings ๐’› โˆˆ ๐’ with ๐’š, ๐’› โˆˆ ๐‘…

โ€ข for each ๐’› โˆˆ ๐’, there are at least ๐‘šโ€ฒ strings ๐’š โˆˆ ๐’€ with ๐’š, ๐’› โˆˆ ๐‘…

Also, for each coordinate j, define Rj = ๐’š, ๐’› โˆˆ ๐‘… โˆถ ๐’š๐‘— โ‰  ๐’›๐‘—

(namely, all the pairs distinguishable by querying coordinate j).

Assume:

โ€ข for each ๐’š โˆˆ ๐’€ and j, there are at most โ„“ strings ๐’› โˆˆ ๐’ with ๐’š, ๐’› โˆˆ ๐‘…๐‘—

โ€ข for each ๐’› โˆˆ ๐’ and j, there are at most โ„“โ€ฒ strings ๐’š โˆˆ ๐’€ with ๐’š, ๐’› โˆˆ ๐‘…๐‘—

Then Q(๐œ‘), the quantum query complexity of ๐œ‘, is โ‰ณ ฮค๐‘š ๐‘šโ€ฒ โ„“ โ„“โ€ฒ.

Page 51: Lecture 20: The Adversary Methododonnell/quantum18/lecture20.pdfย ยท Lecture 20: The Adversary Method for Quantum Query Lower Bounds. Secret N-bit input string w You can query a coordinate

General (โ€œNegative-Weightsโ€) Adversary Method:

For ๐œ‘ = (YES, NO), let ๐’€ โŠ† YES, ๐’ โŠ† NO.

Let ๐‘… โŠ† ๐’€ ร— ๐’ be a set of โ€œhard-to-distinguishโ€ pairs, such that:

โ€ข for each ๐’š โˆˆ ๐’€, there are at least ๐‘š strings ๐’› โˆˆ ๐’ with ๐’š, ๐’› โˆˆ ๐‘…

โ€ข for each ๐’› โˆˆ ๐’, there are at least ๐‘šโ€ฒ strings ๐’š โˆˆ ๐’€ with ๐’š, ๐’› โˆˆ ๐‘…

Also, for each coordinate j, define Rj = ๐’š, ๐’› โˆˆ ๐‘… โˆถ ๐’š๐‘— โ‰  ๐’›๐‘—

(namely, all the pairs distinguishable by querying coordinate j).

Assume:

โ€ข for each ๐’š โˆˆ ๐’€ and j, there are at most โ„“ strings ๐’› โˆˆ ๐’ with ๐’š, ๐’› โˆˆ ๐‘…๐‘—

โ€ข for each ๐’› โˆˆ ๐’ and j, there are at most โ„“โ€ฒ strings ๐’š โˆˆ ๐’€ with ๐’š, ๐’› โˆˆ ๐‘…๐‘—

Then Q(๐œ‘), the quantum query complexity of ๐œ‘, is โ‰ณ ฮค๐‘š ๐‘šโ€ฒ โ„“ โ„“โ€ฒ.

Page 52: Lecture 20: The Adversary Methododonnell/quantum18/lecture20.pdfย ยท Lecture 20: The Adversary Method for Quantum Query Lower Bounds. Secret N-bit input string w You can query a coordinate

General (โ€œNegative-Weightsโ€) Adversary Method:

A story for another time!