arxiv: v1 [quant-ph] 10 Feb 2013
|
|
- Karin Carpenter
- 6 years ago
- Views:
Transcription
1 Provable Advantage for Quantum Strategies in Random Symmetric XOR Games Andris Ambainis, Jānis Iraids arxiv: v [quant-ph] Feb 23 Faculty of Computing, University of Latvia, Raiņa bulvāris 9, Riga, LV-586, Latvia Abstract. Non-local games are widely studied as a model to investigate the properties of quantum mechanics as opposed to classical mechanics. In this paper, we consider a subset of non-local games: symmetric XOR games of n players with - valued questions. For this class of games, each player receives an input bit and responds with an output bit without communicating to the other players. The winning condition only depends on XOR of output bits and is constant w.r.t. permutation of players. We prove that for almost any n-player symmetric XOR game the entangled value of the game is Θ lnn n /4 adapting an old result by Salem and Zygmund on the asymptotics of random trigonometric polynomials. Consequently, we show that the classical-quantum gap is Θ lnn for almost any symmetric XOR game. Introduction Non-local games provide a simple way to test the difference between quantum mechanics and the classical world. A prototypical example of a non-local game is the CHSH game [6] based on the CHSH inequality of [5]. In the CHSH game, we have two players who cannot communicate between themselves but may share common random bits or a bipartite quantum state which has been exchanged before the beginning of the game. A referee sends one uniformly random bit a {,} to the st player and another bit to the 2 nd player. Players respond by sending one-bit answers x,y {,}. They win in the following 2 cases: a If at least one of a,b is equal to, players win if they produce x,y such that x = y; b If a = b =, players win if they produce x,y such that x y; Classically, CHSH game can be won with probability at most.75. In contrast, if players use an entangled quantum state, they can win the game with probability = Other non-local games can be defined by changing the number of players, the number of possible questions and answers and the winning condition. Many non-local games have been studied and, in many cases, strategies that use an entangled quantum state outperform any classical strategy.
2 Recently [], it has been shown that, for a large class of non-local games, quantum strategies are better than any classical strategy for almost all games in this class. Namely, [] considered 2-player games in which the questions a, b are taken from the set {,2,...,n} and the winning condition is either x = y or x y, depending on a,b. Games with a winning condition of such form are called XOR games. [] showed that, for o fraction of all such games, the entangled value of the game is at least.2... times its classical value. Then [2], it was discovered that a similar effect might hold for another class of games: n-player symmetric XOR games with binary questions. Namely, [2] showed a gap between entangled and classical values of order Ω logn - assuming that a non-rigorous argument about the entangled value is correct. In this paper, we make this gap rigorous, by proving upper and lower bounds on the entangled value of a randomgame in this class. We show that, with a high probability, the entangled value is equal to Θ logn. The quantum-vs-classical n /4 gap of Θ logn follows by combining this with the fact that the classical value is of the order Θ shown in [2]. n /4 To prove this result, we use an expression for the entangled value of a symmetric n-player XOR game with entangled answers from [3]. This expression reduces finding the entangled value to maximizing the absolute value of a polynomial in one complex variable. If conditions for the XOR game are chosen at random, this expression reduces to random trigonometric polynomials studied in [7]. Although maxima of random trigonometric polynomials have been studied in [7], they have been studied under different conditions. For this reason, we cannot apply the results from [7] directly. Instead, we adapt the ideas from [7] to prove a bound on maxima of random trigonometric polynomials that would be applicable in our setting. 2 Definitions A non-local game with n players proceeds as follows: Players are separated so that they cannot communicate hence the name non-local, 2 The players receive inputs x,x 2,...,x n I where I is the set of possible inputs. i-th player receives x i, 3 The players respond with outputs y,y 2,...,y n O where O is the set of possible outputs. 4 The winning condition Px,...,x n,y,...,y n is consulted to determine whether the players win or lose. The condition is known to everyone at the start of the game. The players are informed of the rules of the game and they can agree upon a strategy and exchange other information. In the classical case players may only use shared randomness. In the quantum case they can use an entangled quantum state which is distributed to the players before the start of the game.
3 We will restrict ourselves to the case when I = O = {,} and the vector of inputs x,...,x n ischosenuniformlyatrandom.in anxor game,the winning condition Px,...,x n,y,...,y n depends only on x,...,x n and the parity of the output bits n j= y j. A game is symmetric if the winning condition does not change if x,...,x n are permuted. The winning conditions of a symmetric XOR game can be described by a list of n + bits: G = G,G,...,G n, where the players win if and only if G i = n j= y j when n j= x j = i. The entangled value of the game Val Q G is the probability of winning minus the probability of losing in the conditions that the players can use a shared quantum-physical system. In this paper, we study the value of symmetric XOR games when the winning condition G is chosen randomly from the uniform distribution of all n+-bit lists. We use the following lemma which follows from a more general result by Werner and Wolf for non-symmetric XOR games [8]: Lemma See [3]. The entangled value of a symmetric XOR game [3] is Val Q G = max λ = Gj p j λ j where p j is the probability that players are given an input vector x,...,x n with j variables x i =. In our case, since x,...,x n is uniformly random, we have p j = j n 2. n In the following sections we introduce additional notation to keep the proofs more concise as well as to keep in line with the original proofs in [7]: The Rademacher system is a set of functions {ϕ m t} for m =,...,n over t such that ϕ m t = k, where k is the m-th digit after the binary point in the binary expansion of t. Rademacher system will turn out to be a convenient way to state that {G j } are random variables that follow a uniform distribution: if t is chosen randomly from a uniform distribution on t, then {ϕ m t} n+ m= generates a uniformly random element from {+, }n+. That in turn correspondsto coefficients Gj in eq. being picked randomly. Furthermore, we define n r m = n will be clear from context, m R n = rm, 2 P n x,t = T n = j= m= rm 4, m= r m ϕ m+ tcosmx, m= M n t = max x< P nx,t.
4 3 Main Result By adapting the work of Salem and Zygmund [7] on the asymptotics of random trigonometric polynomials, we show Theorem. Theorem 2. lim n Pr[M nt C Rn lnn] = lim n Pr[M nt C 2 Rn lnn] = Our proof yields C = 4 3 and C 2 = 2. We will now show how these two theorems lead to an asymptotic bound for the entangled value of a random game. Corollary. For almost all n-player symmetric quantum XOR games the value of the game is asymptotically lnn n /4. Proof. From Lemma, Val Q G max λ = Re Gj n j λ j 2 n = max j= α [;] Gj n j cosjα 2 n, and Val Q G max λ = Re Gj n j λ j 2 n j= + max λ = Im Gj n j λ j 2 n j= = = max Gj n j cosjα α [;] 2 n + max Gj n j sinjα α [;] 2 n j= For a random game { Gj } follow the same distribution as {ϕ j+ t} for t uniformly distributed from interval [; ]. Therefore Theorem and Theorem 2 apply. Note that Theorem 2 is true for cosines as well as sines since we only use that cos 2 x, and so [ ] lim Pr Rn lnn Rn lnn C n 2 n Val Q G 2C 2 2 n = 2 j= j= Finally, Rn lnn 2 n = 2n n lnn 2 n 4 n πn lnn 2 n = lnn πn
5 4 Proof of Upper and Lower Bounds We now proceed to prove theorems and 2. Our proof is based on an old result by Salem and Zygmund [7], in which they prove bounds on the asymptotics of random trigonometric polynomials in a different setting in which the coefficients r m are not allowed to depend on n. Due to the difference in the two settings, we cannot immediately apply the results from [7]. Instead, we prove corresponding theorems for our setting, reusing the parts of proof from [7] which also work in our case and replacing other parts with different arguments. Lemma 2 From [7]. Let f n t = n m= c mϕ m+ t, where {ϕ m+ t} is the Rademacher system and c m are real constants. Let C n = n m= c2 m,d n = and let λ be any real number. Then n m= c4 m e 2 λ2 C n λ 4 D n e λfnt dt e 2 λ2 C n. Lemma 3 From [7]. Let gx,y, a x b, c y d, be a bounded real function. Suppose that d b c a gx, y A, g2 x,ydxdy = B. b ad c Then, for any positive number µ, d b c a eµgx,y dxdy +µ B + B b ad c A 2eµA. Furthermore, when d b gx,ydxdy =, c a d b c a eµgx,y dxdy + B b ad c A 2eµA. 3 Lemma 4 From [7]. Let x be real and Px = n m= α mcosmx+β m sinmx be a trigonometric polynomial of order n, with real or imaginary coefficients. Let M denote the maximum of Px and let θ be a positive number less than. Then there exists an interval of length not less than θ n in which Px θm. Lemma 5 From [7]. Let ϕx, and suppose that ϕxdx A >, clearly, A 2 B. Let < δ <. Then ϕ 2 xdx B Pr[ϕx δa x ] δa2 B.
6 Lemma 6. n i= n i 4 n n i= n 2 i Proof. If n is even: n i 4 n i= n n i= i 2 n 3 n n 4n n i n n i= n/2 n n i= i = 4n 3 n n 2 n n/2 2n n If n is odd: n i= n n i= i n i 4 2 n+ 2 3 n n 4n n i n n i= n/2 n n i= i = 4n 3 n n 2 n+ n n n Proof of Theorem. Set I n t = e λpnx,t dx. We proceed to give an upper bound for for I ntdt and lower bound for I2 ntdt using Lemma 2. Then we will plug in these bounds in Lemma 5 for ϕ = I n.
7 First, the lower bound clause of Lemma 2 applied to I n t gives for any real λ we will assign its value later, at our convenience, I n tdt = = = > e λpnx,t dx dt = e 2 λ2 n m= rm cosmx2 λ 4 n m= rm cosmx4 dx e 2 λ2 n m= rm cosmx2 λ 4 T n dx = e 4 λ2 R n λ 4 T n e 4 λ2 R n λ 4 T n e 4 λ2 R n λ 4 T n e 4 λ2 R n λ 4 T n e 2 λ2 n m= rm cosmx2 r2 m 2 dx = e 4 λ2 n m= r2 m cos2mx dx > + n 4 λ2 rm 2 cos2mx m= e λpnx,t dtdx dx The second step is to establish an upper bound for a similar fashion, by applying Lemma 2: I2 n tdt. We start out in Intdt 2 = = e 2 λ2 R n+r 2 e λpnx,t+pny,t dtdxdy e 2 λ2 n m= r2 m cosmx+cosmy2 dxdy = e 2 λ2 S nx,y dxdy where S n x,y = m= One can verify that 2 r2 m cos2mx+ 2 r2 m cos2my+2r2 m cosmxcosmy. a S n x,ydxdy =,
8 b c = + m= m= + = 5 4 T n S n x,y dxdy = 2 r2 mcos2mx dx+ 2 r2 mcos2my dy+ m= 2r 2 m cosmxcosmy dxdy = S n x,y 3R n We apply eq. 3 from Lemma 3 with function g = S n, µ = 2 λ2, A = 3R n and B = 5 4 T n. We get And by Lemma 6, 2 e 2 λ2 S nx,y dxdy T n 9Rn 2 e 3 2 λ2 R n + T n Rn 2 e 3 2 λ2 R n + T n Rn 2 e 3 2 λ2 R n n 2 e 2 λ2 R n So far we have established the two prerequisites for Lemma 5: I n tdt > e 4 λ2 R n λ 4 T n, I 2 n tdt e 2 λ2 R n+r n 2 e 3 2 λ2 R n. The third step is to apply Lemma 5 with ϕ = I n, A = e 4 λ2 R n λ 4 T n, B = e 2 λ2 R n+r e 3 n 2 λ2 R n and δ = n η. This results in Pr[I n t n η e 4 λ2 R n λ 4 T n ] n η e 2 λ2 R n 2λ 4 T n e 2 λ2 R n+r n 2e 3 2 λ2 R n n η e 2λ4 T n 2 λ2 r n 2 e 3 2 λ2 R n
9 Finally we show that for suitably chosen λ, θ and η the claim follows. Set lnn λ = θ R n having θ such that 2 η < θ < 3. We deal with the two claims separately: Claim. I n t n η e 4 λ2 R n λ 4 T n = M n t C Rn lnn Proof. Note that e λmnt I n t e 4 λ2 R n λ 4 T n ηlnn Thus M n t 4 λr n λ 3 T n η λ lnn = = θ Rn lnn θ 3 R n lnnlnn T n 4 Rn 2 η Rn lnn = θ = θ R n lnn 4 θ34lnn 3 n η θ R n lnn θ 4 η θ But θ 4 η θ = constant >. We can choose θ arbitrarily close to 3 and η arbitrarily close to to obtain C = 4 3. Claim. lim n n η e 2λ4 T n 2 λ2 r n 2 e 2 λ2 R n = Proof. Since η is positive, n η. e 2λ4 T n 2 λ2 r 2 2θ = e 4 lnn Tn R 2 2 θ2 r 2 lnn n Rn e 8 3 n θ4 lnn 2 θ2 r 2 lnn Rn e = 4 3 n 2 e 3 2 λ2 R n = 4 3 n 2 e 3 2 θ2 lnn = 4 3 n3θ2 2 Proof of Theorem 2. We will examine exists < θ < such that: e λ Pnx,t dxdt. By Lemma 4 there e λ Pnx,t dxdt θ n eθλmnt dt
10 On the other hand, by Lemma 2 we obtain: Therefore, = e λ Pnx,t dxdt = = 4πe 2 λ2 R n e λ Pnx,t dtdx e λpnx,t +e λpnx,t dtdx 2e 2 λ2 n m= r2 m cos2 mx dtdx 2e 2 λ2 R n dtdx = e θλmnt dt 4π θ e 2 λ 2 R n+lnn. lnn Have λ = 2 R n and multiply both sides by n 4 η, where η >. Then The sum over all n converges: n= e θλmnt 4+ηlnn dt 4π θ n +η. e θλmnt 4+ηlnn dt n= 4π θ n +η <. Since the exponent function is non-negative and the whole sum converges, it is safe to interchange sum and integral: Therefore, for almost all t e θλmnt 4+ηlnn dt <. n= e θλmnt 4+ηlnn <. n= Hence, for almost all t there exists n such that for all n n θλm n t 4+ηlnn <. It follows that [ lim Pr n M n t < 4+η 2θ ] Rn lnn =.
11 5 Conclusion We have proven that lnn the entangled value of almost any n-player symmetric XOR game is Θ and therefore by a factor of lnn greater than its n /4 classical value. However, our numerical experiments indicate that neither of the coefficients C and 2C 2 in eq. 2 are tight. In Fig. there is plotted the mean.7.6 V aln Rn lnn 2 n n Fig.. V aln Rn lnn 2 n for a random sample of n player games value of the coefficient over a sample of 5 games for each n up to. We speculate that the actual constant is approaching In this paper we have dealt with a small portion of non-local games. In particular, the case of random non-symmetric games is still open and there has been little progress in multiplayer XOR games with m ary input. The primary hurdle in the n-player m-input setting is at the moment it lacks a description in terms of algebraic and analytic expressions. Recently an approach using the theory of operator norms has been successful in proving the entangled value of 3-player, m-input XOR game [4]. References. Ambainis, A., Bačkurs, A., Balodis, K., Kravčenko, D., Ozols, R., Smotrovs, J., Virza, M.: Quantum strategies are better than classical in almost
12 any xor game. In: Czumaj, A., Mehlhorn, K., Pitts, A., Wattenhofer, R. eds. Automata, Languages, and Programming, Lecture Notes in Computer Science, vol. 739, pp Springer Berlin Heidelberg 22, 2. Ambainis, A., Iraids, J., Kravchenko, D., Virza, M.: Advantage of quantum strategies in random symmetric xor games. In: Kučera, A., Henzinger, T., Nešetřil, J., Vojnar, T., Antoš, D. eds. Mathematical and Engineering Methods in Computer Science, Lecture Notes in Computer Science, vol. 772, pp Springer Berlin Heidelberg 23, 3. Ambainis, A., Kravchenko, D., Nahimovs, N., Rivosh, A.: Nonlocal quantum xor games for large number of players. In: Kratochvíl, J., Li, A., Fiala, J., Kolman, P. eds. Theory and Applications of Models of Computation, Lecture Notes in Computer Science, vol. 68, pp Springer Berlin Heidelberg 2, 4. Briët, J., Vidick, T.: Explicit lower and upper bounds on the entangled value of multiplayer xor games. Communications in Mathematical Physics pp , 5. Clauser, J.F., Horne, M.A., Shimony, A., Holt, R.A.: Proposed experiment to test local hidden-variable theories. Phys. Rev. Lett. 23, Oct 969, 6. Cleve, R., Hoyer, P., Toner, B., Watrous, J.: Consequences and limits of nonlocal strategies. In: Proc. 9th IEEE Annual Conf. Computational Complexity. pp , 7. Salem, R., Zygmund, A.: Some properties of trigonometric series whose terms have random signs. Acta Mathematica 9, , 8. Werner, R.F., Wolf, M.M.: All-multipartite bell-correlation inequalities for two dichotomic observables per site. Phys. Rev. A 64, 322 Aug 2,
Nonlocal Quantum XOR Games for Large Number of Players
onlocal Quantum XOR Games for Large umber of Players Andris Ambainis, Dmitry Kravchenko, ikolajs ahimovs, Alexander Rivosh Faculty of Computing, University of Latvia Abstract onlocal games are used to
More informationWorst case analysis of non-local games
Worst case analysis of non-local games Andris Ambainis 1, Artūrs Bačkurs 2, Kaspars Balodis 1, Agnis Škuškovniks1, Juris Smotrovs 1, and Madars Virza 2 1 Faculty of Computing, University of Latvia, Raina
More informationLecture 6 Sept. 14, 2015
PHYS 7895: Quantum Information Theory Fall 205 Prof. Mark M. Wilde Lecture 6 Sept., 205 Scribe: Mark M. Wilde This document is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 3.0
More informationExplicit bounds on the entangled value of multiplayer XOR games. Joint work with Thomas Vidick (MIT)
Explicit bounds on the entangled value of multiplayer XOR games Jop Briët Joint work with Thomas Vidick (MIT) Waterloo, 2012 Entanglement and nonlocal correlations [Bell64] Measurements on entangled quantum
More informationProvable Advantage for Quantum Strategies in Random Symmetric XOR Games
Provable Advatage for Quatum Strategies i Radom Symmetric XOR Games Adris Ambaiis ad Jāis Iraids Faculty of Computig, Uiversity of Latvia Raiņa bulvāris 9, Riga, LV-586, Latvia adrisambaiis@lulv, jaisiraids@gmailcom
More informationQuantum Correlations: From Bell inequalities to Tsirelson s theorem
Quantum Correlations: From Bell inequalities to Tsirelson s theorem David Avis April, 7 Abstract The cut polytope and its relatives are good models of the correlations that can be obtained between events
More informationThe CHSH game as a Bell test thought experiment
The CHSH game as a Bell test thought experiment Logan Meredith December 10, 2017 1 Introduction The CHSH inequality, named after John Clauser, Michael Horne, Abner Shimony, and Richard Holt, provides an
More informationLecture 20: Bell inequalities and nonlocality
CPSC 59/69: Quantum Computation John Watrous, University of Calgary Lecture 0: Bell inequalities and nonlocality April 4, 006 So far in the course we have considered uses for quantum information in the
More informationarxiv:quant-ph/ v2 5 May 2003
Bell Inequalities with Auxiliary Communication D. Bacon and B. F. Toner Institute for Quantum Information, California Institute of Technology, Pasadena, CA 91125 and Department of Physics, California Institute
More informationarxiv: v1 [quant-ph] 6 Feb 2013
Exact quantum query complexity of EXACT and THRESHOLD arxiv:302.235v [quant-ph] 6 Feb 203 Andris Ambainis Jānis Iraids Juris Smotrovs University of Latvia, Raiņa bulvāris 9, Riga, LV-586, Latvia February
More informationNonlocal games and XOR games
Nonlocal games and XOR games In previous lectures, we discussed a few fairly direct connections between quantum information theoretic notions and semidefinite programs. For instance, the semidefinite program
More informationPart 3.3 Differentiation Taylor Polynomials
Part 3.3 Differentiation 3..3.1 Taylor Polynomials Definition 3.3.1 Taylor 1715 and Maclaurin 1742) If a is a fixed number, and f is a function whose first n derivatives exist at a then the Taylor polynomial
More informationarxiv: v1 [quant-ph] 7 Jun 2016
PERFECT COMMUTING-OPERATOR STRATEGIES FOR LINEAR SYSTEM GAMES arxiv:1606.02278v1 [quant-ph] 7 Jun 2016 RICHARD CLEVE, LI LIU, AND WILLIAM SLOFSTRA Abstract. Linear system games are a generalization of
More informationarxiv: v3 [quant-ph] 20 Jan 2016
arxiv:1508.01601v3 [quant-ph] 0 Jan 016 Two-player conflicting interest Bayesian games and Bell nonlocality Haozhen Situ April 14, 018 Abstract Nonlocality, one of the most remarkable aspects of quantum
More informationExtended Nonlocal Games from Quantum-Classical Games
CHICAGO JOURNAL OF THEORETICAL COMPUTER SCIENCE 2018, Article 04, pages 1 12 http://cjtcs.cs.uchicago.edu/ Extended Nonlocal Games from Quantum-Classical Games Vincent Russo John Watrous Received October
More informationarxiv:quant-ph/ v2 11 Jan 2010
Consequences and Limits of Nonlocal Strategies Richard Cleve Peter Høyer Ben Toner John Watrous January 11, 2010 arxiv:quant-ph/0404076v2 11 Jan 2010 Abstract This paper investigates the powers and limitations
More informationCS286.2 Lecture 15: Tsirelson s characterization of XOR games
CS86. Lecture 5: Tsirelson s characterization of XOR games Scribe: Zeyu Guo We first recall the notion of quantum multi-player games: a quantum k-player game involves a verifier V and k players P,...,
More informationSubstituting a qubit for an arbitrarily large amount of classical communication
Substituting a qubit for an arbitrarily large amount of classical communication Ernesto F. Galvão and Lucien Hardy Centre for Quantum Computation, Clarendon Laboratory, University of Oxford, Parks Road,
More informationarxiv: v2 [quant-ph] 21 Oct 2013
Genuine hidden quantum nonlocality Flavien Hirsch, 1 Marco Túlio Quintino, 1 Joseph Bowles, 1 and Nicolas Brunner 1, 1 Département de Physique Théorique, Université de Genève, 111 Genève, Switzerland H.H.
More informationarxiv: v1 [quant-ph] 5 Sep 2017
Extended Nonlocal Games from Quantum-Classical Games Vincent Russo 1 John Watrous 1,2 arxiv:1709.01837v1 [quant-ph] 5 Sep 2017 1 Institute for Quantum Computing and School of Computer Science University
More informationCS286.2 Lecture 8: A variant of QPCP for multiplayer entangled games
CS286.2 Lecture 8: A variant of QPCP for multiplayer entangled games Scribe: Zeyu Guo In the first lecture, we saw three equivalent variants of the classical PCP theorems in terms of CSP, proof checking,
More informationarxiv: v1 [cs.cc] 31 May 2014
Size of Sets with Small Sensitivity: a Generalization of Simon s Lemma Andris Ambainis and Jevgēnijs Vihrovs arxiv:1406.0073v1 [cs.cc] 31 May 2014 Faculty of Computing, University of Latvia, Raiņa bulv.
More informationRandomness in nonlocal games between mistrustful players
Randomness in nonlocal games between mistrustful players Carl A. Miller and Yaoyun Shi* Source paper: Forcing classical behavior for quantum players by C. Miller and Y. Shi (2016), attached. One of the
More informationNon-local Boxes. Philippe Lamontagne. July 31, 2014
Non-local Boxes Philippe Lamontagne July 31, 2014 1 Contents 1 Introduction 3 1.1 Preliminaries........................... 3 2 The Non-signaling Polytope 6 2.1 Deporalization...........................
More informationarxiv: v2 [quant-ph] 22 Sep 2008
Distilling Non-Locality Manuel Forster Severin Winkler Stefan Wolf Computer Science Department, ETH Zürich, ETH Zentrum, CH-8092 Zürich, Switzerland. E-mail: {forstema,swinkler,wolfst}@ethz.ch arxiv:0809.3173v2
More informationA Note on the Geometric Interpretation of Bell s Inequalities
Lett Math Phys DOI 10.1007/s11005-013-0631-8 A Note on the Geometric Interpretation of Bell s Inequalities PAOLO DAI PRA, MICHELE PAVON and NEERAJA SAHASRABUDHE Dipartimento di Matematica, Università di
More informationarxiv: v1 [quant-ph] 23 May 2015
Bell inequalities from group actions: Three parties and non-abelian groups V. Uğur Güney and Mar Hillery Department of Physics, Hunter College of the City University of New Yor, 695 Par Avenue, New Yor,
More informationPolynomials, quantum query complexity, and Grothendieck s inequality
Polynomials, quantum query complexity, and Grothendieck s inequality Scott Aaronson 1, Andris Ambainis 2, Jānis Iraids 2, Martins Kokainis 2, Juris Smotrovs 2 1 Computer Science and Artificial Intelligence
More informationSpatial versus Sequential Correlations for Random Access Coding
Spatial versus Sequential Correlations for Random Access Coding Armin Tavakoli 1,2, Breno Marques 1,, Marcin Paw lowski 2, Mohamed Bourennane 1 1 Department of Physics, Stockholm University, S-1061 Stockholm,
More informationThe Quantum Query Complexity of Algebraic Properties
The Quantum Query Complexity of Algebraic Properties Sebastian Dörn Institut für Theoretische Informatik Universität Ulm 89069 Ulm, Germany Thomas Thierauf Fak. Elektronik und Informatik HTW Aalen 73430
More informationGrothendieck Inequalities, XOR games, and Communication Complexity
Grothendieck Inequalities, XOR games, and Communication Complexity Troy Lee Rutgers University Joint work with: Jop Briët, Harry Buhrman, and Thomas Vidick Overview Introduce XOR games, Grothendieck s
More informationSuper-Quantum, Non-Signaling Correlations Cannot Exist
Super-Quantum, Non-Signaling Correlations Cannot Exist Pierre Uzan University Paris-Diderot laboratory SPHERE, History and Philosophy of Science Abstract It seems that non-local correlations stronger than
More informationMath 416 Lecture 3. The average or mean or expected value of x 1, x 2, x 3,..., x n is
Math 416 Lecture 3 Expected values The average or mean or expected value of x 1, x 2, x 3,..., x n is x 1 x 2... x n n x 1 1 n x 2 1 n... x n 1 n 1 n x i p x i where p x i 1 n is the probability of x i
More informationCPSC 536N: Randomized Algorithms Term 2. Lecture 9
CPSC 536N: Randomized Algorithms 2011-12 Term 2 Prof. Nick Harvey Lecture 9 University of British Columbia 1 Polynomial Identity Testing In the first lecture we discussed the problem of testing equality
More informationSome limits on non-local randomness expansion
Some limits on non-local randomness expansion Matt Coudron and Henry Yuen December 12, 2012 1 Introduction God does not play dice. Albert Einstein Einstein, stop telling God what to do. Niels Bohr One
More information4.1 Analysis of functions I: Increase, decrease and concavity
4.1 Analysis of functions I: Increase, decrease and concavity Definition Let f be defined on an interval and let x 1 and x 2 denote points in that interval. a) f is said to be increasing on the interval
More informationarxiv: v1 [quant-ph] 15 Feb 2016
arxiv:1602.04645v1 [quant-ph] 15 Feb 2016 On the existence of a local quasi hidden variable (LqHV) model for each N-qudit state and the maximal quantum violation of Bell inequalities Elena R. Loubenets
More informationRank-one and Quantum XOR Games
Rank-one and Quantum XOR Games T. Cooney 1 M. Junge 2 C. Palazuelos 3 D. Pérez García 1 and O. Regev 4 T. Vidick 5 1 Universidad Complutense de Madrid 2 University of Illinois at Urbana Champaign 3 Instituto
More informationMath 4263 Homework Set 1
Homework Set 1 1. Solve the following PDE/BVP 2. Solve the following PDE/BVP 2u t + 3u x = 0 u (x, 0) = sin (x) u x + e x u y = 0 u (0, y) = y 2 3. (a) Find the curves γ : t (x (t), y (t)) such that that
More informationSimultaneous Communication Protocols with Quantum and Classical Messages
Simultaneous Communication Protocols with Quantum and Classical Messages Oded Regev Ronald de Wolf July 17, 2008 Abstract We study the simultaneous message passing model of communication complexity, for
More informationState Complexity Advantages of Ultrametric Automata
State Complexity Advantages of Ultrametric Automata Maksims Dimitrijevs University of Latvia Faculty of Computing, Raiņa bulvāris 19, Riga, LV-1586, Latvia Abstract. Ultrametric automata have properties
More informationRademacher functions
Rademacher functions Jordan Bell jordan.bell@gmail.com Department of Mathematics, University of Toronto July 6, 4 Binary expansions Define S : {, } N [, ] by Sσ σ k k, σ {, }N. For example, for σ and σ,
More informationGeneralized Tsirelson Inequalities, Commuting-Operator Provers, and Multi-Prover Interactive Proof Systems
23rd Annual IEEE Conference on Computational Complexity Generalized Tsirelson Ineualities, Commuting-Operator Provers, and Multi-Prover Interactive Proof Systems Tsuyoshi Ito School of Computer Science
More informationSuper-Quantum, Non-Signaling Correlations Cannot Exist
Super-Quantum, Non-Signaling Correlations Cannot Exist Pierre Uzan University Paris-Diderot, laboratory SPHERE, History and Philosophy of Science pierre.uzan@paris7.jussieu.fr Abstract Non-local correlations
More informationQUANTUM FINITE AUTOMATA. Andris Ambainis 1 1 Faculty of Computing, University of Latvia,
QUANTUM FINITE AUTOMATA Andris Ambainis 1 1 Faculty of Computing, University of Latvia, Raiņa bulv. 19, Rīga, LV-1586, Latvia. Email: ambainis@lu.lv Abstract Quantum finite automata (QFAs) are quantum
More informationQUANTUM COMMUNICATIONS BASED ON QUANTUM HASHING. Alexander Vasiliev. Kazan Federal University
QUANTUM COMMUNICATIONS BASED ON QUANTUM HASHING Alexander Vasiliev Kazan Federal University Abstract: In this paper we consider an application of the recently proposed quantum hashing technique for computing
More information11 a 12 a 21 a 11 a 22 a 12 a 21. (C.11) A = The determinant of a product of two matrices is given by AB = A B 1 1 = (C.13) and similarly.
C PROPERTIES OF MATRICES 697 to whether the permutation i 1 i 2 i N is even or odd, respectively Note that I =1 Thus, for a 2 2 matrix, the determinant takes the form A = a 11 a 12 = a a 21 a 11 a 22 a
More informationMath 489AB A Very Brief Intro to Fourier Series Fall 2008
Math 489AB A Very Brief Intro to Fourier Series Fall 8 Contents Fourier Series. The coefficients........................................ Convergence......................................... 4.3 Convergence
More informationOn the Gap Between ess(f) and cnf size(f) (Extended Abstract)
On the Gap Between and (Extended Abstract) Lisa Hellerstein and Devorah Kletenik Polytechnic Institute of NYU, 6 Metrotech Center, Brooklyn, N.Y., 11201 Abstract Given a Boolean function f, denotes the
More informationAbstract. 2. We construct several transcendental numbers.
Abstract. We prove Liouville s Theorem for the order of approximation by rationals of real algebraic numbers. 2. We construct several transcendental numbers. 3. We define Poissonian Behaviour, and study
More informationFourier Sin and Cos Series and Least Squares Convergence
Fourier and east Squares Convergence James K. Peterson Department of Biological Sciences and Department of Mathematical Sciences Clemson University May 7, 28 Outline et s look at the original Fourier sin
More informationA Tight Lower Bound on Certificate Complexity in Terms of Block Sensitivity and Sensitivity
Electronic Colloquium on Computational Complexity, Report No. 27 (2014) A Tight Lower Bound on Certificate Complexity in Terms of Block Sensitivity and Sensitivity Krišjānis Prūsis and Andris Ambainis
More informationarxiv: v1 [quant-ph] 8 Feb 2016
An analytical condition for the violation of Mer s inequality by any three qubit state Satyabrata Adhikari 1, and A. S. Majumdar 2, 1 Birla Institute of Technology Mesra, Ranchi-835215, India 2 S. N. Bose
More informationHow Low Can Approximate Degree and Quantum Query Complexity be for Total Boolean Functions?
How Low Can Approximate Degree and Quantum Query Complexity be for Total Boolean Functions? Andris Ambainis Ronald de Wolf Abstract It has long been known that any Boolean function that depends on n input
More informationQuantum Hashing for Finite Abelian Groups arxiv: v1 [quant-ph] 7 Mar 2016
Quantum Hashing for Finite Abelian Groups arxiv:1603.02209v1 [quant-ph] 7 Mar 2016 Alexander Vasiliev Abstract We propose a generalization of the quantum hashing technique based on the notion of the small-bias
More informationarxiv: v2 [quant-ph] 13 Jan 2011
Quantum Bell Inequalities from Macroscopic Locality arxiv:1011.0246v2 [quant-ph] 13 Jan 2011 Tzyh Haur Yang, 1 Miguel Navascués, 2 Lana Sheridan, 1 and Valerio Scarani 1,3 1 Centre for Quantum Technologies,
More informationThe one-way communication complexity of the Boolean Hidden Matching Problem
The one-way communication complexity of the Boolean Hidden Matching Problem Iordanis Kerenidis CRS - LRI Université Paris-Sud jkeren@lri.fr Ran Raz Faculty of Mathematics Weizmann Institute ran.raz@weizmann.ac.il
More informationLecture 13: Lower Bounds using the Adversary Method. 2 The Super-Basic Adversary Method [Amb02]
Quantum Computation (CMU 18-859BB, Fall 015) Lecture 13: Lower Bounds using the Adversary Method October 1, 015 Lecturer: Ryan O Donnell Scribe: Kumail Jaffer 1 Introduction There are a number of known
More informationThe relation between Hardy s non-locality and violation of Bell inequality
The relation between Hardy s non-locality and violation of Bell inequality Xiang Yang( ) School of Physics and Electronics, Henan University, Kaifeng 475001, China (Received 20 September 2010; revised
More informationLimitations of Non-deterministic Finite Automata Imposed by One Letter Input Alphabet
Limitations of Non-deterministic Finite Automata Imposed by One Letter Input Alphabet Laura Mančinska, Māris Ozols, Renāte Praude and Agnese Zalcmane violeta@navigator.lv, marozols@yahoo.com, renka@inbox.lv,
More informationThe length-ω 1 open game quantifier propagates scales
The length-ω 1 open game quantifier propagates scales John R. Steel June 5, 2006 0 Introduction We shall call a set T an ω 1 -tree if only if T α
More informationQuantum algorithms for testing Boolean functions
Quantum algorithms for testing Boolean functions Dominik F. Floess Erika Andersson SUPA, School of Engineering and Physical Sciences Heriot-Watt University, Edinburgh EH4 4AS, United Kingdom dominikfloess@gmx.de
More informationLecture Hardness of Set Cover
PCPs and Inapproxiability CIS 6930 October 5, 2009 Lecture Hardness of Set Cover Lecturer: Dr. My T. Thai Scribe: Ying Xuan 1 Preliminaries 1.1 Two-Prover-One-Round Proof System A new PCP model 2P1R Think
More informationOn the power of quantum, one round, two prover interactive proof systems
On the power of quantum, one round, two prover interactive proof systems Alex Rapaport and Amnon Ta-Shma Department of Computer Science Tel-Aviv University Israel 69978. email: rapapo,amnon@post.tau.ac.il.
More informationTHE INVERSE FUNCTION THEOREM
THE INVERSE FUNCTION THEOREM W. PATRICK HOOPER The implicit function theorem is the following result: Theorem 1. Let f be a C 1 function from a neighborhood of a point a R n into R n. Suppose A = Df(a)
More informationarxiv:quant-ph/ v1 29 May 2003
Quantum Lower Bounds for Collision and Element Distinctness with Small Range arxiv:quant-ph/0305179v1 29 May 2003 Andris Ambainis Abstract We give a general method for proving quantum lower bounds for
More informationON A WEIGHTED INTERPOLATION OF FUNCTIONS WITH CIRCULAR MAJORANT
ON A WEIGHTED INTERPOLATION OF FUNCTIONS WITH CIRCULAR MAJORANT Received: 31 July, 2008 Accepted: 06 February, 2009 Communicated by: SIMON J SMITH Department of Mathematics and Statistics La Trobe University,
More informationAlgebra II Mathematics N-CN The Complex Number System
GRADE HS Algebra II Mathematics N-CN The Complex Number System K-2 3-5 6-8 9-12 Perform arithmetic operations with complex numbers. N.CN.1 N.CN.2 There is a complex number i such that i 2 = -1, and every
More informationMath 2Z03 - Tutorial # 6. Oct. 26th, 27th, 28th, 2015
Math 2Z03 - Tutorial # 6 Oct. 26th, 27th, 28th, 2015 Tutorial Info: Tutorial Website: http://ms.mcmaster.ca/ dedieula/2z03.html Office Hours: Mondays 3pm - 5pm (in the Math Help Centre) Tutorial #6: 3.4
More informationDetermine whether the formula determines y as a function of x. If not, explain. Is there a way to look at a graph and determine if it's a function?
1.2 Functions and Their Properties Name: Objectives: Students will be able to represent functions numerically, algebraically, and graphically, determine the domain and range for functions, and analyze
More informationLecture 10 + additional notes
CSE533: Information Theorn Computer Science November 1, 2010 Lecturer: Anup Rao Lecture 10 + additional notes Scribe: Mohammad Moharrami 1 Constraint satisfaction problems We start by defining bivariate
More informationEigenvalues, random walks and Ramanujan graphs
Eigenvalues, random walks and Ramanujan graphs David Ellis 1 The Expander Mixing lemma We have seen that a bounded-degree graph is a good edge-expander if and only if if has large spectral gap If G = (V,
More informationMeasure and Integration: Solutions of CW2
Measure and Integration: s of CW2 Fall 206 [G. Holzegel] December 9, 206 Problem of Sheet 5 a) Left (f n ) and (g n ) be sequences of integrable functions with f n (x) f (x) and g n (x) g (x) for almost
More informationMax-Planck-Institut für Mathematik in den Naturwissenschaften Leipzig
Max-Planck-Institut für Mathematik in den aturwissenschaften Leipzig Bell inequality for multipartite qubit quantum system and the maximal violation by Ming Li and Shao-Ming Fei Preprint no.: 27 2013 Bell
More informationQualification Exam: Mathematical Methods
Qualification Exam: Mathematical Methods Name:, QEID#41534189: August, 218 Qualification Exam QEID#41534189 2 1 Mathematical Methods I Problem 1. ID:MM-1-2 Solve the differential equation dy + y = sin
More informationMaxima and Minima. (a, b) of R if
Maxima and Minima Definition Let R be any region on the xy-plane, a function f (x, y) attains its absolute or global, maximum value M on R at the point (a, b) of R if (i) f (x, y) M for all points (x,
More informationEfficient Conversion of Secret-shared Values Between Different Fields
Efficient Conversion of Secret-shared Values Between Different Fields Ivan Damgård and Rune Thorbek BRICS, Dept. of Computer Science, University of Aarhus Abstract. We show how to effectively convert a
More informationAvoider-Enforcer games played on edge disjoint hypergraphs
Avoider-Enforcer games played on edge disjoint hypergraphs Asaf Ferber Michael Krivelevich Alon Naor July 8, 2013 Abstract We analyze Avoider-Enforcer games played on edge disjoint hypergraphs, providing
More information(Non-)Contextuality of Physical Theories as an Axiom
(Non-)Contextuality of Physical Theories as an Axiom Simone Severini Department of Computer Science QIP 2011 Plan 1. Introduction: non-contextuality 2. Results: a general framework to study non-contextuality;
More informationSolution Set for Homework #1
CS 683 Spring 07 Learning, Games, and Electronic Markets Solution Set for Homework #1 1. Suppose x and y are real numbers and x > y. Prove that e x > ex e y x y > e y. Solution: Let f(s = e s. By the mean
More informationHMMT February 2018 February 10, 2018
HMMT February 018 February 10, 018 Algebra and Number Theory 1. For some real number c, the graphs of the equation y = x 0 + x + 18 and the line y = x + c intersect at exactly one point. What is c? 18
More informationHandout 5. α a1 a n. }, where. xi if a i = 1 1 if a i = 0.
Notes on Complexity Theory Last updated: October, 2005 Jonathan Katz Handout 5 1 An Improved Upper-Bound on Circuit Size Here we show the result promised in the previous lecture regarding an upper-bound
More informationBit-Commitment and Coin Flipping in a Device-Independent Setting
Bit-Commitment and Coin Flipping in a Device-Independent Setting J. Silman Université Libre de Bruxelles Joint work with: A. Chailloux & I. Kerenidis (LIAFA), N. Aharon (TAU), S. Pironio & S. Massar (ULB).
More informationMaximum subsets of (0, 1] with no solutions to x + y = kz
Maximum subsets of 0, 1] with no solutions to x + y = z Fan R. K. Chung Department of Mathematics University of Pennsylvania Philadelphia, PA 19104 John L. Goldwasser West Virginia University Morgantown,
More informationECE 4400:693 - Information Theory
ECE 4400:693 - Information Theory Dr. Nghi Tran Lecture 8: Differential Entropy Dr. Nghi Tran (ECE-University of Akron) ECE 4400:693 Lecture 1 / 43 Outline 1 Review: Entropy of discrete RVs 2 Differential
More informationFunctional Analysis HW #3
Functional Analysis HW #3 Sangchul Lee October 26, 2015 1 Solutions Exercise 2.1. Let D = { f C([0, 1]) : f C([0, 1])} and define f d = f + f. Show that D is a Banach algebra and that the Gelfand transform
More informationPUTNAM TRAINING POLYNOMIALS. Exercises 1. Find a polynomial with integral coefficients whose zeros include
PUTNAM TRAINING POLYNOMIALS (Last updated: December 11, 2017) Remark. This is a list of exercises on polynomials. Miguel A. Lerma Exercises 1. Find a polynomial with integral coefficients whose zeros include
More informationA better lower bound for quantum algorithms searching an ordered list
A better lower bound for quantum algorithms searching an ordered list Andris Ambainis Computer Science Division University of California Berkeley, CA 94720, e-mail: ambainis@cs.berkeley.edu Abstract We
More informationFIBONACCI NUMBERS AND DECIMATION OF BINARY SEQUENCES
FIBONACCI NUMBERS AND DECIMATION OF BINARY SEQUENCES Jovan Dj. Golić Security Innovation, Telecom Italia Via Reiss Romoli 274, 10148 Turin, Italy (Submitted August 2004-Final Revision April 200) ABSTRACT
More informationLocal Maxima and Improved Exact Algorithm for MAX-2-SAT
CHICAGO JOURNAL OF THEORETICAL COMPUTER SCIENCE 2018, Article 02, pages 1 22 http://cjtcs.cs.uchicago.edu/ Local Maxima and Improved Exact Algorithm for MAX-2-SAT Matthew B. Hastings Received March 8,
More informationAsymptotic Behavior of Infinity Harmonic Functions Near an Isolated Singularity
Savin, O., and C. Wang. (2008) Asymptotic Behavior of Infinity Harmonic Functions, International Mathematics Research Notices, Vol. 2008, Article ID rnm163, 23 pages. doi:10.1093/imrn/rnm163 Asymptotic
More informationOn the Concentration of the Crest Factor for OFDM Signals
On the Concentration of the Crest Factor for OFDM Signals Igal Sason Department of Electrical Engineering Technion - Israel Institute of Technology, Haifa 3, Israel E-mail: sason@eetechnionacil Abstract
More informationf (r) (a) r! (x a) r, r=0
Part 3.3 Differentiation v1 2018 Taylor Polynomials Definition 3.3.1 Taylor 1715 and Maclaurin 1742) If a is a fixed number, and f is a function whose first n derivatives exist at a then the Taylor polynomial
More informationTEST CODE: MMA (Objective type) 2015 SYLLABUS
TEST CODE: MMA (Objective type) 2015 SYLLABUS Analytical Reasoning Algebra Arithmetic, geometric and harmonic progression. Continued fractions. Elementary combinatorics: Permutations and combinations,
More informationFourier Series. 1. Review of Linear Algebra
Fourier Series In this section we give a short introduction to Fourier Analysis. If you are interested in Fourier analysis and would like to know more detail, I highly recommend the following book: Fourier
More informationarxiv: v4 [math-ph] 28 Aug 2013
On selective influences, marginal selectivity, arxiv:1211.2342v4 [math-ph] 28 Aug 2013 and Bell/CHSH inequalities Ehtibar N. Dzhafarov 1 and Janne V. Kujala 2 1 Purdue University, Department of Psychological
More informationSecond-Order Homogeneous Linear Equations with Constant Coefficients
15 Second-Order Homogeneous Linear Equations with Constant Coefficients A very important class of second-order homogeneous linear equations consists of those with constant coefficients; that is, those
More informationA subexponential lower bound for the Random Facet algorithm for Parity Games
A subexponential lower bound for the Random Facet algorithm for Parity Games Oliver Friedmann 1 Thomas Dueholm Hansen 2 Uri Zwick 3 1 Department of Computer Science, University of Munich, Germany. 2 Center
More informationMath 172 Problem Set 5 Solutions
Math 172 Problem Set 5 Solutions 2.4 Let E = {(t, x : < x b, x t b}. To prove integrability of g, first observe that b b b f(t b b g(x dx = dt t dx f(t t dtdx. x Next note that f(t/t χ E is a measurable
More informationPartial Differential Equations Separation of Variables. 1 Partial Differential Equations and Operators
PDE-SEP-HEAT-1 Partial Differential Equations Separation of Variables 1 Partial Differential Equations and Operators et C = C(R 2 ) be the collection of infinitely differentiable functions from the plane
More information