Tutorial on the adversary method for quantum and classical lower bounds. Sophie Laplante LRI, Université Paris-Sud Orsay

Size: px
Start display at page:

Download "Tutorial on the adversary method for quantum and classical lower bounds. Sophie Laplante LRI, Université Paris-Sud Orsay"

Transcription

1 Tutorial on the adversary method for quantum and classical lower bounds Sophie Laplante LRI, Université Paris-Sud Orsay

2 Adversary method lower bounds Exact complexity Strong lower bound Semidefinite Programming [BSS03] Kolmogorov method [LM04] Quantum query complexity Polynomial method [BBCMW01] Spectral method [BSS03] Weighted adversary [A03] Weak lower bound Adversary method [A02] 2

3 Summary of this talk Deterministic method - General statement - Combinatorial bound DT (f) R max i R i max{ m l, m l } Quantum method - General statement - Combinatorial bound [A02] Q ε (f) Weighted method [A03, LM04] Q ε (f) c ε 2 min x,y,i Spectral method [BSS03] Q ε (f) c ε 2 c ε R i P rogress t(i) c ε mm 2 ll p(x)p(y)p x,i (y)p y,i (x) q(x, y) Γ max i Γ i 3

4 Classical decision tree model To compute a boolean function f : {0,1} n {0,1}, x 1 = 0 x 1 =? x 1 = 1 Model : decision tree Cost : Number of queries to input Query complexity of f : depth of shallowest decision tree for f x 2 =? x 3 =? x 2 = 0 x 2 = 1 x 3 = 0 x 3 = 1 x 3 =? x 3 = 0 x 5 =? x 3 = 1 x 5 =? x 5 = 0 x 5 = 0 x 5 = 1 x 5 = 1 ACC REJ REJ ACC 4

5 Quantum query model ancilla Computation U 0 Query O x Computation U 1 Query: Unitary transformation maps i, b to i, b x i Computation : ψ T = U T O x O x U 0 0 O x that Query O x Query O x Computation U T Output: Measure 1st qubit of Error probability at most 1/3 ψ T Same model with stochastic matrices for randomized query complexity output 5

6 Estimating number of pieces by their size 6

7 Adversary method, deterministic setting Goal: separate {x : f(x)=1} from {y : f(y)=0} with minimum queries to input bits Subrelation Ri : pairs for which query i is useful Queries number of Ri needed to cover R. R {x : f(x)=1} {y : f(y)=0} y x xi yi DT (f) R max i R i Ri 7

8 Deterministic lower bound left degree of R m right degree m left degree of all Ri l right degree l R m X, m Y Ri l X, l Y DT (f) R max i R i max{ m l, m l } R {x : f(x)=1} {y : f(y)=0} y x Ri xi yi 8

9 Progress on x, y, i after a query At time t, progress towards distinguishing (x,y) Ri by making one query : Deterministic case DProgresst x,y (i) = Randomized case RProgresst x,y (i) = 2 min{p x t (i), p y t (i)} Quantum case? (next slide) Progresst x,y (i) { 1 if query(x,t) = i 0 otherwise 9

10 Quantum progress State of the system after query t, on input x is written ψt x Fix (x,y) R. At beginning, At each time step, ψ x t ψ y t ψ x t+1 ψ y t+1 2 ψ x 0 ψ y 0 = 1 Amplitude 2 of i in query t, input x p x t (i)p y t (i) ψ x 0 ψ y 0 At the end, i:x i y i ψ x T ψ y T 2 ε(1 ε) T 2 p x t (i)p y t (i) 1 2 ε(1 ε) i Progress t x,y(i) c ε 10

11 Quantum progress on x, y, i after a query At time t, progress towards distinguishing (x,y) Ri by making one query : Deterministic case DProgresst x,y (i) = Randomized case RProgresst x,y (i) = Quantum case QProgresst x,y (i) = 2 p x t (i)p y t (i) Progresst x,y (i) { 1 if query(x, t) = i 0 otherwise 2 min{p x t (i), p y t (i)} 11

12 Ambainis unweighted method Claim: Proof: P rogress t (i) 2 l X l Y i P rogress t (i) i = x,y,i = 2 x,y,i P rogress x,y t (i) p x t (i)p y t (i) 2 x i y p x t (i) y p y t (i) i x Cauchy Schwarz X terms p x t (i) = 1 i l terms 2 l X l Y 13

13 Ambainis unweighted method Claim: P rogress t (i) 2 l X l Y i Corollary: Q ε (f) c ε R i P rogress t(i) m X m Y c ε 2 lx l Y Q ε (f) c ε mm 2 ll R max{m X, m Y } m X m Y 13

14 Example: OR function m=1 l=1 m =n l = Deterministic queries max{m/l, m /l } = n Quantum queries = n mm ll 14

15 Unweighted lmax lower bound left degree of R m right degree m R {x : f(x)=1} {y : f(y)=0} left degree of Ri li right degree li R m X, m Y P rogress t (i) 2 max i {l i X l i Y } i Q ε (f) c ε 2 mm max i {l i l i } x Ri xi yi y 15

16 Example: Connectivity k k+1 X X k'+1 k' Deterministic queries max{m/l, m /l } = n 2 m n 2 (x) li n ( ) li 1 m n 2 li =1 li =n Quantum queries mm ll = n 3/2 16

17 Weighted method 1/8 1/8 1/8 3/16 1/8 1/16 1/8 1/8 17

18 Weight scheme for adversary method q(x,y) x q(x,y) y p(x) p' x,i (y) i i' i'' i''' p' y,i (x) p(y) x,y R q(x, y) = 1, x X p(x) = 1, y Y p x,i(y) = 1 18

19 Weighted adversary method Consider three distributions over pairs (x,y) R P (x, y) = i P (x, y) = i p(x)p x t (i)p x,i(y), p(y)p y t (i)p y,i(x), Claim: Q(x, y) = q(x, y) (x, y) R i P rogress x,y t (i) 2max i q(x, y) p(x)p x,i (y)p(y)p y,i (x) P (x, y)p (x, y) x,y P (x, y) P (x, y) x,y x,y 1 = Q(x, y) x,y Proof: x, y P (x, y)p (x, y) Q(x, y) x, y p x t (i)p y q(x, y) t (i) i min i p(x)p(y)p x,i (y)p y,i (x) 19

20 Weighted adversary method Consider three distributions over pairs (x,y) R P (x, y) = i P (x, y) = i p(x)p x t (i)p x,i(y), p(y)p y t (i)p y,i(x), Q(x, y) = q(x, y) Claim: (x, y) R i P rogress x,y t (i) 2max i q(x, y) p(x)p x,i (y)p(y)p y,i (x) Corollary: Recall that (x, y) R Q ε (f) Q ε (f) c ε 2 min x,y,i c ε i P rogressx,y t (i) p(x)p(y)p x,i (y)p y,i (x) q(x, y) 19

21 Example: Ambainis function f(x 1 x 2 x 3 x 4 ) = 1 if x 1 x 2 x 3 x 4 1 if x 1 x 2 x 3 x 4 0 otherwise q(x,y) !! 3/80 3/80 1/40 1/ p(x) = p(y) =1/8 Q ε (f) c ε 2 min x,y,i p(x)p(y)p x,i (y)p y,i (x) q(x, y) 20

22 Example: Ambainis function f(x 1 x 2 x 3 x 4 ) = 1 if x 1 x 2 x 3 x 4 1 if x 1 x 2 x 3 x 4 0 otherwise !! 0001 p' x,i (y) 3/4 1/4 p' y,i (x) 3/ !! !! q(x,y) 3/80 1/40 p x,i (y)p y,i (x) q(x, y) p(x)p(y) 1/8 1/ !! 1 1/ !! Q ε (f) c ε 2 min x,y,i 1/40 p(x)p(y)p x,i (y)p y,i (x) q(x, y) 20 1/8 = 20/8 = 5/2 20

23 Spectral method Nonnegative weights matrix Γ[x, y] x Γ[x, y] y Γ[x, y] = 0 if f(x) = f(y) { 0 if xi = y Γ i [x, y] = i Γ[x, y] otherwise Γ = max u Γv u,v u = v =1 Q ε (f) c ε 2 Idea: q(x,y) derived from p(x), p(y) derived from u, v maximizing u*tv Γ max i Γ i " p y,i(x), p x,i(y) derived from ui, vi maximizing ui*tivi 21

From Adversaries to Algorithms. Troy Lee Rutgers University

From Adversaries to Algorithms. Troy Lee Rutgers University From Adversaries to Algorithms Troy Lee Rutgers University Quantum Query Complexity As in classical complexity, it is difficult to show lower bounds on the time or number of gates required to solve a problem

More information

The quantum adversary method and classical formula size lower bounds

The quantum adversary method and classical formula size lower bounds The quantum adversary method and classical formula size lower bounds Sophie Laplante LRI, Université Paris-Sud laplante@lri.fr Troy Lee CWI and University of Amsterdam Troy.Lee@cwi.nl Mario Szegedy Rutgers

More information

The quantum adversary method and classical formula size lower bounds

The quantum adversary method and classical formula size lower bounds The quantum adversary method and classical formula size lower bounds Sophie Laplante LRI, Université Paris-Sud laplante@lri.fr Troy Lee CWI and University of Amsterdam Troy.Lee@cwi.nl Mario Szegedy Rutgers

More information

The query register and working memory together form the accessible memory, denoted H A. Thus the state of the algorithm is described by a vector

The query register and working memory together form the accessible memory, denoted H A. Thus the state of the algorithm is described by a vector 1 Query model In the quantum query model we wish to compute some function f and we access the input through queries. The complexity of f is the number of queries needed to compute f on a worst-case input

More information

Reflections Reflections

Reflections Reflections Reflections Reflections for quantum query algorithms Ben Reichardt University of Waterloo Reflections Reflections for quantum query algorithms Ben Reichardt University of Waterloo Reflections for quantum

More information

Lower Bounds on Quantum Query Complexity

Lower Bounds on Quantum Query Complexity Lower Bounds on Quantum Query Complexity Peter Høyer hoyer@cpsc.ucalgary.ca Robert Špalek sr@cwi.nl arxiv:quant-ph/0509153v1 21 Sep 2005 September 2005 Abstract Shor s and Grover s famous quantum algorithms

More information

Lecture 3: Constructing a Quantum Model

Lecture 3: Constructing a Quantum Model CS 880: Quantum Information Processing 9/9/010 Lecture 3: Constructing a Quantum Model Instructor: Dieter van Melkebeek Scribe: Brian Nixon This lecture focuses on quantum computation by contrasting it

More information

Polynomials, quantum query complexity, and Grothendieck s inequality

Polynomials, quantum query complexity, and Grothendieck s inequality Polynomials, quantum query complexity, and Grothendieck s inequality Scott Aaronson 1, Andris Ambainis 2, Jānis Iraids 2, Martins Kokainis 2, Juris Smotrovs 2 1 Computer Science and Artificial Intelligence

More information

Lecture 13: Lower Bounds using the Adversary Method. 2 The Super-Basic Adversary Method [Amb02]

Lecture 13: Lower Bounds using the Adversary Method. 2 The Super-Basic Adversary Method [Amb02] Quantum Computation (CMU 18-859BB, Fall 015) Lecture 13: Lower Bounds using the Adversary Method October 1, 015 Lecturer: Ryan O Donnell Scribe: Kumail Jaffer 1 Introduction There are a number of known

More information

arxiv:quant-ph/ v1 27 Nov 2003

arxiv:quant-ph/ v1 27 Nov 2003 Lower bounds for randomized and quantum query complexity using Kolmogorov arguments Sophie Laplante Frédéric Magniez arxiv:quant-ph/0389v 27 Nov 2003 Abstract We prove a very general lower bound technique

More information

Quantum Query Complexity of Boolean Functions with Small On-Sets

Quantum Query Complexity of Boolean Functions with Small On-Sets Quantum Query Complexity of Boolean Functions with Small On-Sets Seiichiro Tani TT/JST ERATO-SORST. Joint work with Andris Ambainis Univ. of Latvia Kazuo Iwama Kyoto Univ. Masaki akanishi AIST. Harumichi

More information

CS286.2 Lecture 15: Tsirelson s characterization of XOR games

CS286.2 Lecture 15: Tsirelson s characterization of XOR games CS86. Lecture 5: Tsirelson s characterization of XOR games Scribe: Zeyu Guo We first recall the notion of quantum multi-player games: a quantum k-player game involves a verifier V and k players P,...,

More information

Chebyshev Polynomials, Approximate Degree, and Their Applications

Chebyshev Polynomials, Approximate Degree, and Their Applications Chebyshev Polynomials, Approximate Degree, and Their Applications Justin Thaler 1 Georgetown University Boolean Functions Boolean function f : { 1, 1} n { 1, 1} AND n (x) = { 1 (TRUE) if x = ( 1) n 1 (FALSE)

More information

Quantum algorithms. Andrew Childs. Institute for Quantum Computing University of Waterloo

Quantum algorithms. Andrew Childs. Institute for Quantum Computing University of Waterloo Quantum algorithms Andrew Childs Institute for Quantum Computing University of Waterloo 11th Canadian Summer School on Quantum Information 8 9 June 2011 Based in part on slides prepared with Pawel Wocjan

More information

Quantum Query Algorithm Constructions for Computing AND, OR and MAJORITY Boolean Functions

Quantum Query Algorithm Constructions for Computing AND, OR and MAJORITY Boolean Functions LATVIJAS UNIVERSITĀTES RAKSTI. 008, 733. sēj.: DATORZINĀTNE UN INFORMĀCIJAS TEHNOLOĢIJAS 15. 38. lpp. Quantum Query Algorithm Constructions for Computing AND, OR and MAJORITY Boolean Functions Alina Vasiljeva

More information

CS Foundations of Communication Complexity

CS Foundations of Communication Complexity CS 49 - Foundations of Communication Complexity Lecturer: Toniann Pitassi 1 The Discrepancy Method Cont d In the previous lecture we ve outlined the discrepancy method, which is a method for getting lower

More information

The Quantum Query Complexity of the Determinant

The Quantum Query Complexity of the Determinant The Quantum Query Complexity of the Determinant Sebastian Dörn Inst. für Theoretische Informatik Universität Ulm 89069 Ulm, Germany Thomas Thierauf Fak. Elektronik und Informatik HTW Aalen 73430 Aalen,

More information

C/CS/Phys 191 Quantum Gates and Universality 9/22/05 Fall 2005 Lecture 8. a b b d. w. Therefore, U preserves norms and angles (up to sign).

C/CS/Phys 191 Quantum Gates and Universality 9/22/05 Fall 2005 Lecture 8. a b b d. w. Therefore, U preserves norms and angles (up to sign). C/CS/Phys 191 Quantum Gates and Universality 9//05 Fall 005 Lecture 8 1 Readings Benenti, Casati, and Strini: Classical circuits and computation Ch.1.,.6 Quantum Gates Ch. 3.-3.4 Universality Ch. 3.5-3.6

More information

Functional Analysis Exercise Class

Functional Analysis Exercise Class Functional Analysis Exercise Class Week 9 November 13 November Deadline to hand in the homeworks: your exercise class on week 16 November 20 November Exercises (1) Show that if T B(X, Y ) and S B(Y, Z)

More information

Compute the Fourier transform on the first register to get x {0,1} n x 0.

Compute the Fourier transform on the first register to get x {0,1} n x 0. CS 94 Recursive Fourier Sampling, Simon s Algorithm /5/009 Spring 009 Lecture 3 1 Review Recall that we can write any classical circuit x f(x) as a reversible circuit R f. We can view R f as a unitary

More information

Quantum walk algorithms

Quantum walk algorithms Quantum walk algorithms Andrew Childs Institute for Quantum Computing University of Waterloo 28 September 2011 Randomized algorithms Randomness is an important tool in computer science Black-box problems

More information

Quantum algorithms based on span programs

Quantum algorithms based on span programs Quantum algorithms based on span programs Ben Reichardt IQC, U Waterloo [arxiv:0904.2759] Model: Complexity measure: Quantum algorithms Black-box query complexity Span programs Witness size [KW 93] [RŠ

More information

Deutsch s Algorithm. Dimitrios I. Myrisiotis. MPLA CoReLab. April 26, / 70

Deutsch s Algorithm. Dimitrios I. Myrisiotis. MPLA CoReLab. April 26, / 70 Deutsch s Algorithm Dimitrios I. Myrisiotis MPLA CoReLab April 6, 017 1 / 70 Contents Introduction Preliminaries The Algorithm Misc. / 70 Introduction 3 / 70 Introduction Figure : David Deutsch (1953 ).

More information

Lecture 2: From Classical to Quantum Model of Computation

Lecture 2: From Classical to Quantum Model of Computation CS 880: Quantum Information Processing 9/7/10 Lecture : From Classical to Quantum Model of Computation Instructor: Dieter van Melkebeek Scribe: Tyson Williams Last class we introduced two models for deterministic

More information

The Quantum Query Complexity of Algebraic Properties

The Quantum Query Complexity of Algebraic Properties The Quantum Query Complexity of Algebraic Properties Sebastian Dörn Institut für Theoretische Informatik Universität Ulm 89069 Ulm, Germany Thomas Thierauf Fak. Elektronik und Informatik HTW Aalen 73430

More information

Complexity Theory VU , SS The Polynomial Hierarchy. Reinhard Pichler

Complexity Theory VU , SS The Polynomial Hierarchy. Reinhard Pichler Complexity Theory Complexity Theory VU 181.142, SS 2018 6. The Polynomial Hierarchy Reinhard Pichler Institut für Informationssysteme Arbeitsbereich DBAI Technische Universität Wien 15 May, 2018 Reinhard

More information

Outline. Complexity Theory EXACT TSP. The Class DP. Definition. Problem EXACT TSP. Complexity of EXACT TSP. Proposition VU 181.

Outline. Complexity Theory EXACT TSP. The Class DP. Definition. Problem EXACT TSP. Complexity of EXACT TSP. Proposition VU 181. Complexity Theory Complexity Theory Outline Complexity Theory VU 181.142, SS 2018 6. The Polynomial Hierarchy Reinhard Pichler Institut für Informationssysteme Arbeitsbereich DBAI Technische Universität

More information

CS540 ANSWER SHEET

CS540 ANSWER SHEET CS540 ANSWER SHEET Name Email 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. 20. 1 2 Final Examination CS540-1: Introduction to Artificial Intelligence Fall 2016 20 questions, 5 points

More information

Quantum Algorithms for Computing the Boolean Function AND and Verifying Repetition Code

Quantum Algorithms for Computing the Boolean Function AND and Verifying Repetition Code Scientific Papers, University of Latvia, 2010 Vol 756 Computer Science and Information echnologies 227 247 P Quantum Algorithms for Computing the Boolean Function AND and Verifying Repetition Code Alina

More information

Semidefinite and Second Order Cone Programming Seminar Fall 2001 Lecture 2

Semidefinite and Second Order Cone Programming Seminar Fall 2001 Lecture 2 Semidefinite and Second Order Cone Programming Seminar Fall 2001 Lecture 2 Instructor: Farid Alizadeh Scribe: Xuan Li 9/17/2001 1 Overview We survey the basic notions of cones and cone-lp and give several

More information

Complex numbers: a quick review. Chapter 10. Quantum algorithms. Definition: where i = 1. Polar form of z = a + b i is z = re iθ, where

Complex numbers: a quick review. Chapter 10. Quantum algorithms. Definition: where i = 1. Polar form of z = a + b i is z = re iθ, where Chapter 0 Quantum algorithms Complex numbers: a quick review / 4 / 4 Definition: C = { a + b i : a, b R } where i = Polar form of z = a + b i is z = re iθ, where r = z = a + b and θ = tan y x Alternatively,

More information

arxiv: v1 [quant-ph] 6 Feb 2013

arxiv: v1 [quant-ph] 6 Feb 2013 Exact quantum query complexity of EXACT and THRESHOLD arxiv:302.235v [quant-ph] 6 Feb 203 Andris Ambainis Jānis Iraids Juris Smotrovs University of Latvia, Raiņa bulvāris 9, Riga, LV-586, Latvia February

More information

QUANTUM COMPUTATION. Exercise sheet 1. Ashley Montanaro, University of Bristol H Z U = 1 2

QUANTUM COMPUTATION. Exercise sheet 1. Ashley Montanaro, University of Bristol H Z U = 1 2 School of Mathematics Spring 017 QUANTUM COMPUTATION Exercise sheet 1 Ashley Montanaro, University of Bristol ashley.montanaro@bristol.ac.uk 1. The quantum circuit model. (a) Consider the following quantum

More information

Quantum algorithms (CO 781/CS 867/QIC 823, Winter 2013) Andrew Childs, University of Waterloo LECTURE 13: Query complexity and the polynomial method

Quantum algorithms (CO 781/CS 867/QIC 823, Winter 2013) Andrew Childs, University of Waterloo LECTURE 13: Query complexity and the polynomial method Quantum algorithms (CO 781/CS 867/QIC 823, Winter 2013) Andrew Childs, University of Waterloo LECTURE 13: Query complexity and the polynomial method So far, we have discussed several different kinds of

More information

Simulating classical circuits with quantum circuits. The complexity class Reversible-P. Universal gate set for reversible circuits P = Reversible-P

Simulating classical circuits with quantum circuits. The complexity class Reversible-P. Universal gate set for reversible circuits P = Reversible-P Quantum Circuits Based on notes by John Watrous and also Sco8 Aaronson: www.sco8aaronson.com/democritus/ John Preskill: www.theory.caltech.edu/people/preskill/ph229 Outline Simulating classical circuits

More information

Quantum Complexity of Testing Group Commutativity

Quantum Complexity of Testing Group Commutativity Quantum Complexity of Testing Group Commutativity Frédéric Magniez 1 and Ashwin Nayak 2 1 CNRS LRI, UMR 8623 Université Paris Sud, France 2 University of Waterloo and Perimeter Institute for Theoretical

More information

A better lower bound for quantum algorithms searching an ordered list

A better lower bound for quantum algorithms searching an ordered list A better lower bound for quantum algorithms searching an ordered list Andris Ambainis Computer Science Division University of California Berkeley, CA 94720, e-mail: ambainis@cs.berkeley.edu Abstract We

More information

Quantum Complexity Theory and Adiabatic Computation

Quantum Complexity Theory and Adiabatic Computation Chapter 9 Quantum Complexity Theory and Adiabatic Computation 9.1 Defining Quantum Complexity We are familiar with complexity theory in classical computer science: how quickly can a computer (or Turing

More information

CS286.2 Lecture 8: A variant of QPCP for multiplayer entangled games

CS286.2 Lecture 8: A variant of QPCP for multiplayer entangled games CS286.2 Lecture 8: A variant of QPCP for multiplayer entangled games Scribe: Zeyu Guo In the first lecture, we saw three equivalent variants of the classical PCP theorems in terms of CSP, proof checking,

More information

Improvements of the Giaccardi and the Petrović inequality and related Stolarsky type means

Improvements of the Giaccardi and the Petrović inequality and related Stolarsky type means Annals of the University of Craiova, Mathematics and Computer Science Series Volume 391, 01, Pages 65 75 ISSN: 13-6934 Improvements of the Giaccardi and the Petrović inequality and related Stolarsky type

More information

Lecture 4: Elementary Quantum Algorithms

Lecture 4: Elementary Quantum Algorithms CS 880: Quantum Information Processing 9/13/010 Lecture 4: Elementary Quantum Algorithms Instructor: Dieter van Melkebeek Scribe: Kenneth Rudinger This lecture introduces several simple quantum algorithms.

More information

Introduction to Quantum Information Processing

Introduction to Quantum Information Processing Introduction to Quantum Information Processing Lecture 6 Richard Cleve Overview of Lecture 6 Continuation of teleportation Computation and some basic complexity classes Simple quantum algorithms in the

More information

6.045: Automata, Computability, and Complexity (GITCS) Class 17 Nancy Lynch

6.045: Automata, Computability, and Complexity (GITCS) Class 17 Nancy Lynch 6.045: Automata, Computability, and Complexity (GITCS) Class 17 Nancy Lynch Today Probabilistic Turing Machines and Probabilistic Time Complexity Classes Now add a new capability to standard TMs: random

More information

On the distinguishability of random quantum states

On the distinguishability of random quantum states 1 1 Department of Computer Science University of Bristol Bristol, UK quant-ph/0607011 Distinguishing quantum states Distinguishing quantum states This talk Question Consider a known ensemble E of n quantum

More information

Chapter 10. Quantum algorithms

Chapter 10. Quantum algorithms Chapter 10. Quantum algorithms Complex numbers: a quick review Definition: C = { a + b i : a, b R } where i = 1. Polar form of z = a + b i is z = re iθ, where r = z = a 2 + b 2 and θ = tan 1 y x Alternatively,

More information

Lecture 4: Postulates of quantum mechanics

Lecture 4: Postulates of quantum mechanics Lecture 4: Postulates of quantum mechanics Rajat Mittal IIT Kanpur The postulates of quantum mechanics provide us the mathematical formalism over which the physical theory is developed. For people studying

More information

Direct product theorem for discrepancy

Direct product theorem for discrepancy Direct product theorem for discrepancy Troy Lee Rutgers University Joint work with: Robert Špalek Direct product theorems Knowing how to compute f, how can you compute f f f? Obvious upper bounds: If can

More information

Introduction to Quantum Algorithms Part I: Quantum Gates and Simon s Algorithm

Introduction to Quantum Algorithms Part I: Quantum Gates and Simon s Algorithm Part I: Quantum Gates and Simon s Algorithm Martin Rötteler NEC Laboratories America, Inc. 4 Independence Way, Suite 00 Princeton, NJ 08540, U.S.A. International Summer School on Quantum Information, Max-Planck-Institut

More information

Quantum Computing. Winter Quarter, 2011 and Spring Quarter, 2013

Quantum Computing. Winter Quarter, 2011 and Spring Quarter, 2013 Quantum Computing Instructor: Alexander Razborov, University of Chicago. razborov@cs.uchicago.edu Course Homepage: http://people.cs.uchicago.edu/~razborov/teaching/winter11.html Winter Quarter, 2011 and

More information

4.6. Linear Operators on Hilbert Spaces

4.6. Linear Operators on Hilbert Spaces 4.6. Linear Operators on Hilbert Spaces 1 4.6. Linear Operators on Hilbert Spaces Note. This section explores a number of different kinds of bounded linear transformations (or, equivalently, operators

More information

Symmetric Norm Inequalities And Positive Semi-Definite Block-Matrices

Symmetric Norm Inequalities And Positive Semi-Definite Block-Matrices Symmetric Norm Inequalities And Positive Semi-Definite lock-matrices Antoine Mhanna To cite this version: Antoine Mhanna Symmetric Norm Inequalities And Positive Semi-Definite lock-matrices 15

More information

CS/Ph120 Homework 4 Solutions

CS/Ph120 Homework 4 Solutions CS/Ph10 Homework 4 Solutions November 3, 016 Problem 1: Robustness of GHZ and W states, part Solution: Due to Bolton Bailey a For the GHZ state, we have T r N GHZ N GHZ N = 1 0 N 1 0 N 1 + 1 N 1 1 N 1

More information

4.4 Noetherian Rings

4.4 Noetherian Rings 4.4 Noetherian Rings Recall that a ring A is Noetherian if it satisfies the following three equivalent conditions: (1) Every nonempty set of ideals of A has a maximal element (the maximal condition); (2)

More information

An Approximation Algorithm for Approximation Rank

An Approximation Algorithm for Approximation Rank An Approximation Algorithm for Approximation Rank Troy Lee Columbia University Adi Shraibman Weizmann Institute Conventions Identify a communication function f : X Y { 1, +1} with the associated X-by-Y

More information

ELE539A: Optimization of Communication Systems Lecture 15: Semidefinite Programming, Detection and Estimation Applications

ELE539A: Optimization of Communication Systems Lecture 15: Semidefinite Programming, Detection and Estimation Applications ELE539A: Optimization of Communication Systems Lecture 15: Semidefinite Programming, Detection and Estimation Applications Professor M. Chiang Electrical Engineering Department, Princeton University March

More information

Symmetric Matrices and Eigendecomposition

Symmetric Matrices and Eigendecomposition Symmetric Matrices and Eigendecomposition Robert M. Freund January, 2014 c 2014 Massachusetts Institute of Technology. All rights reserved. 1 2 1 Symmetric Matrices and Convexity of Quadratic Functions

More information

LINEAR ALGEBRA BOOT CAMP WEEK 4: THE SPECTRAL THEOREM

LINEAR ALGEBRA BOOT CAMP WEEK 4: THE SPECTRAL THEOREM LINEAR ALGEBRA BOOT CAMP WEEK 4: THE SPECTRAL THEOREM Unless otherwise stated, all vector spaces in this worksheet are finite dimensional and the scalar field F is R or C. Definition 1. A linear operator

More information

A semi-definite program for quantum query complexity

A semi-definite program for quantum query complexity A semi-definite program for quantum query complexity Ben Reichardt University of Waterloo [These slides and notes are for a 30-minute talk given at the second Barriers in Computational Complexity Workshop,

More information

A Strong Parallel Repetition Theorem for Projection Games on Expanders

A Strong Parallel Repetition Theorem for Projection Games on Expanders Electronic Colloquium on Computational Complexity, Report No. 142 (2010) A Strong Parallel Repetition Theorem for Projection Games on Expanders Ran Raz Ricky Rosen Abstract The parallel repetition theorem

More information

Factorization in Polynomial Rings

Factorization in Polynomial Rings Factorization in Polynomial Rings These notes are a summary of some of the important points on divisibility in polynomial rings from 17 and 18. PIDs Definition 1 A principal ideal domain (PID) is an integral

More information

Quantum Computing: Foundations to Frontier Fall Lecture 3

Quantum Computing: Foundations to Frontier Fall Lecture 3 Quantum Computing: Foundations to Frontier Fall 018 Lecturer: Henry Yuen Lecture 3 Scribes: Seyed Sajjad Nezhadi, Angad Kalra Nora Hahn, David Wandler 1 Overview In Lecture 3, we started off talking about

More information

Classical and Quantum Complexity of the Sturm-Liouville Eigenvalue Problem

Classical and Quantum Complexity of the Sturm-Liouville Eigenvalue Problem Classical and Quantum Complexity of the Sturm-Liouville Eigenvalue Problem A. Papageorgiou 1 and H. Woźniakowski 1, Department of Computer Science, Columbia University, New York, USA Institute of Applied

More information

MP 472 Quantum Information and Computation

MP 472 Quantum Information and Computation MP 472 Quantum Information and Computation http://www.thphys.may.ie/staff/jvala/mp472.htm Outline Open quantum systems The density operator ensemble of quantum states general properties the reduced density

More information

An Introduction to Quantum Information and Applications

An Introduction to Quantum Information and Applications An Introduction to Quantum Information and Applications Iordanis Kerenidis CNRS LIAFA-Univ Paris-Diderot Quantum information and computation Quantum information and computation How is information encoded

More information

Convex sets, conic matrix factorizations and conic rank lower bounds

Convex sets, conic matrix factorizations and conic rank lower bounds Convex sets, conic matrix factorizations and conic rank lower bounds Pablo A. Parrilo Laboratory for Information and Decision Systems Electrical Engineering and Computer Science Massachusetts Institute

More information

Construction of latin squares of prime order

Construction of latin squares of prime order Construction of latin squares of prime order Theorem. If p is prime, then there exist p 1 MOLS of order p. Construction: The elements in the latin square will be the elements of Z p, the integers modulo

More information

Communication is bounded by root of rank

Communication is bounded by root of rank Electronic Colloquium on Computational Complexity, Report No. 84 (2013) Communication is bounded by root of rank Shachar Lovett June 7, 2013 Abstract We prove that any total boolean function of rank r

More information

Chapter 7 Polynomial Functions. Factoring Review. We will talk about 3 Types: ALWAYS FACTOR OUT FIRST! Ex 2: Factor x x + 64

Chapter 7 Polynomial Functions. Factoring Review. We will talk about 3 Types: ALWAYS FACTOR OUT FIRST! Ex 2: Factor x x + 64 Chapter 7 Polynomial Functions Factoring Review We will talk about 3 Types: 1. 2. 3. ALWAYS FACTOR OUT FIRST! Ex 1: Factor x 2 + 5x + 6 Ex 2: Factor x 2 + 16x + 64 Ex 3: Factor 4x 2 + 6x 18 Ex 4: Factor

More information

The quantum query complexity of read-many formulas

The quantum query complexity of read-many formulas The quantum query complexity of read-many formulas Andrew Childs Waterloo Shelby Kimmel MIT Robin Kothari Waterloo Boolean formulas ^ x 1 x 2 _ x 3 ^ x 1 x 3 A formula is read-once if every input appears

More information

5 Flows and cuts in digraphs

5 Flows and cuts in digraphs 5 Flows and cuts in digraphs Recall that a digraph or network is a pair G = (V, E) where V is a set and E is a multiset of ordered pairs of elements of V, which we refer to as arcs. Note that two vertices

More information

Introduction to Quantum Computing

Introduction to Quantum Computing Introduction to Quantum Computing Petros Wallden Lecture 7: Complexity & Algorithms I 13th October 016 School of Informatics, University of Edinburgh Complexity - Computational Complexity: Classification

More information

4 Linear operators and linear functionals

4 Linear operators and linear functionals 4 Linear operators and linear functionals The next section is devoted to studying linear operators between normed spaces. Definition 4.1. Let V and W be normed spaces over a field F. We say that T : V

More information

Classes of Boolean Functions

Classes of Boolean Functions Classes of Boolean Functions Nader H. Bshouty Eyal Kushilevitz Abstract Here we give classes of Boolean functions that considered in COLT. Classes of Functions Here we introduce the basic classes of functions

More information

arxiv:quant-ph/ v1 18 Nov 2004

arxiv:quant-ph/ v1 18 Nov 2004 Improved Bounds on Quantum Learning Algorithms arxiv:quant-ph/0411140v1 18 Nov 2004 Alp Atıcı Department of Mathematics Columbia University New York, NY 10027 atici@math.columbia.edu March 13, 2008 Abstract

More information

Quantum algorithms based on quantum walks. Jérémie Roland (ULB - QuIC) Quantum walks Grenoble, Novembre / 39

Quantum algorithms based on quantum walks. Jérémie Roland (ULB - QuIC) Quantum walks Grenoble, Novembre / 39 Quantum algorithms based on quantum walks Jérémie Roland Université Libre de Bruxelles Quantum Information & Communication Jérémie Roland (ULB - QuIC) Quantum walks Grenoble, Novembre 2012 1 / 39 Outline

More information

Lecture 10: Learning DNF, AC 0, Juntas. 1 Learning DNF in Almost Polynomial Time

Lecture 10: Learning DNF, AC 0, Juntas. 1 Learning DNF in Almost Polynomial Time Analysis of Boolean Functions (CMU 8-859S, Spring 2007) Lecture 0: Learning DNF, AC 0, Juntas Feb 5, 2007 Lecturer: Ryan O Donnell Scribe: Elaine Shi Learning DNF in Almost Polynomial Time From previous

More information

1 Directional Derivatives and Differentiability

1 Directional Derivatives and Differentiability Wednesday, January 18, 2012 1 Directional Derivatives and Differentiability Let E R N, let f : E R and let x 0 E. Given a direction v R N, let L be the line through x 0 in the direction v, that is, L :=

More information

Math 40510, Algebraic Geometry

Math 40510, Algebraic Geometry Math 40510, Algebraic Geometry Problem Set 1, due February 10, 2016 1. Let k = Z p, the field with p elements, where p is a prime. Find a polynomial f k[x, y] that vanishes at every point of k 2. [Hint:

More information

Quantum and Classical Query Complexities of Local Search are Polynomially Related

Quantum and Classical Query Complexities of Local Search are Polynomially Related Quantum and Classical Query Complexities of Local Search are Polynomially Related Miklos Santha Mario Szegedy Abstract Let f be an integer valued function on a finite set V. We call an undirected graph

More information

Quantum algorithms (CO 781, Winter 2008) Prof. Andrew Childs, University of Waterloo LECTURE 11: From random walk to quantum walk

Quantum algorithms (CO 781, Winter 2008) Prof. Andrew Childs, University of Waterloo LECTURE 11: From random walk to quantum walk Quantum algorithms (CO 781, Winter 2008) Prof. Andrew Childs, University of Waterloo LECTURE 11: From random walk to quantum walk We now turn to a second major topic in quantum algorithms, the concept

More information

Fourier analysis of boolean functions in quantum computation

Fourier analysis of boolean functions in quantum computation Fourier analysis of boolean functions in quantum computation Ashley Montanaro Centre for Quantum Information and Foundations, Department of Applied Mathematics and Theoretical Physics, University of Cambridge

More information

Optimal quantum adversary lower bounds for ordered search

Optimal quantum adversary lower bounds for ordered search Optimal quantum adversary lower bounds for ordered search Andrew M. Childs Troy Lee Abstract The goal of the ordered search problem is to find a particular item in an ordered list of n items. Using the

More information

Quantum Computation. Michael A. Nielsen. University of Queensland

Quantum Computation. Michael A. Nielsen. University of Queensland Quantum Computation Michael A. Nielsen University of Queensland Goals: 1. To eplain the quantum circuit model of computation. 2. To eplain Deutsch s algorithm. 3. To eplain an alternate model of quantum

More information

Definition A.1. We say a set of functions A C(X) separates points if for every x, y X, there is a function f A so f(x) f(y).

Definition A.1. We say a set of functions A C(X) separates points if for every x, y X, there is a function f A so f(x) f(y). The Stone-Weierstrass theorem Throughout this section, X denotes a compact Hausdorff space, for example a compact metric space. In what follows, we take C(X) to denote the algebra of real-valued continuous

More information

Problem Set: TT Quantum Information

Problem Set: TT Quantum Information Problem Set: TT Quantum Information Basics of Information Theory 1. Alice can send four messages A, B, C, and D over a classical channel. She chooses A with probability 1/, B with probability 1/4 and C

More information

Unions of Solutions. Unions. Unions of solutions

Unions of Solutions. Unions. Unions of solutions Unions of Solutions We ll begin this chapter by discussing unions of sets. Then we ll focus our attention on unions of sets that are solutions of polynomial equations. Unions If B is a set, and if C is

More information

Faster quantum algorithm for evaluating game trees

Faster quantum algorithm for evaluating game trees Faster quantum algorithm for evaluating game trees x 7 x 8 Ben Reichardt xx1 1 x 2 x 3 x 4 x 6 OR x 9 x1 1 x 5 x 9 University of Waterloo x 5 AND OR AND AND OR AND ϕ(x) x 7 x 8 x 1 x 2 x 3 x 4 x 6 OR x

More information

CS120, Quantum Cryptography, Fall 2016

CS120, Quantum Cryptography, Fall 2016 CS10, Quantum Cryptography, Fall 016 Homework # due: 10:9AM, October 18th, 016 Ground rules: Your homework should be submitted to the marked bins that will be by Annenberg 41. Please format your solutions

More information

the Information Bottleneck

the Information Bottleneck the Information Bottleneck Daniel Moyer December 10, 2017 Imaging Genetics Center/Information Science Institute University of Southern California Sorry, no Neuroimaging! (at least not presented) 0 Instead,

More information

Complete problems for classes in PH, The Polynomial-Time Hierarchy (PH) oracle is like a subroutine, or function in

Complete problems for classes in PH, The Polynomial-Time Hierarchy (PH) oracle is like a subroutine, or function in Oracle Turing Machines Nondeterministic OTM defined in the same way (transition relation, rather than function) oracle is like a subroutine, or function in your favorite PL but each call counts as single

More information

8. Limit Laws. lim(f g)(x) = lim f(x) lim g(x), (x) = lim x a f(x) g lim x a g(x)

8. Limit Laws. lim(f g)(x) = lim f(x) lim g(x), (x) = lim x a f(x) g lim x a g(x) 8. Limit Laws 8.1. Basic Limit Laws. If f and g are two functions and we know the it of each of them at a given point a, then we can easily compute the it at a of their sum, difference, product, constant

More information

Lecture 7. 1 Normalized Adjacency and Laplacian Matrices

Lecture 7. 1 Normalized Adjacency and Laplacian Matrices ORIE 6334 Spectral Graph Theory September 3, 206 Lecturer: David P. Williamson Lecture 7 Scribe: Sam Gutekunst In this lecture, we introduce normalized adjacency and Laplacian matrices. We state and begin

More information

Math 328 Course Notes

Math 328 Course Notes Math 328 Course Notes Ian Robertson March 3, 2006 3 Properties of C[0, 1]: Sup-norm and Completeness In this chapter we are going to examine the vector space of all continuous functions defined on the

More information

Polynomial bounds for decoupling, with applica8ons. Ryan O Donnell, Yu Zhao Carnegie Mellon University

Polynomial bounds for decoupling, with applica8ons. Ryan O Donnell, Yu Zhao Carnegie Mellon University Polynomial bounds for decoupling, with applica8ons Ryan O Donnell, Yu Zhao Carnegie Mellon University Boolean func8ons Maj 3 (x 1,x 2,x 3 ) = 1 1 x 1 x 2 x 3 1 1 1 1 1 1-1 1 1-1 1 1 1-1 -1-1 -1 1 1 1-1

More information

CPSC 536N: Randomized Algorithms Term 2. Lecture 9

CPSC 536N: Randomized Algorithms Term 2. Lecture 9 CPSC 536N: Randomized Algorithms 2011-12 Term 2 Prof. Nick Harvey Lecture 9 University of British Columbia 1 Polynomial Identity Testing In the first lecture we discussed the problem of testing equality

More information

Nonlocal Quantum XOR Games for Large Number of Players

Nonlocal Quantum XOR Games for Large Number of Players onlocal Quantum XOR Games for Large umber of Players Andris Ambainis, Dmitry Kravchenko, ikolajs ahimovs, Alexander Rivosh Faculty of Computing, University of Latvia Abstract onlocal games are used to

More information

Ph 219b/CS 219b. Exercises Due: Wednesday 4 December 2013

Ph 219b/CS 219b. Exercises Due: Wednesday 4 December 2013 1 Ph 219b/CS 219b Exercises Due: Wednesday 4 December 2013 4.1 The peak in the Fourier transform In the period finding algorithm we prepared the periodic state A 1 1 x 0 + jr, (1) A j=0 where A is the

More information

There are two things that are particularly nice about the first basis

There are two things that are particularly nice about the first basis Orthogonality and the Gram-Schmidt Process In Chapter 4, we spent a great deal of time studying the problem of finding a basis for a vector space We know that a basis for a vector space can potentially

More information

On the efficient approximability of constraint satisfaction problems

On the efficient approximability of constraint satisfaction problems On the efficient approximability of constraint satisfaction problems July 13, 2007 My world Max-CSP Efficient computation. P Polynomial time BPP Probabilistic Polynomial time (still efficient) NP Non-deterministic

More information

Introduction to Adiabatic Quantum Computation

Introduction to Adiabatic Quantum Computation Introduction to Adiabatic Quantum Computation Vicky Choi Department of Computer Science Virginia Tech April 6, 2 Outline Motivation: Maximum Independent Set(MIS) Problem vs Ising Problem 2 Basics: Quantum

More information