Adversary-Based Parity Lower Bounds with Small Probability Bias

Size: px
Start display at page:

Download "Adversary-Based Parity Lower Bounds with Small Probability Bias"

Transcription

1 Adversary-Based Parity Lower Bounds with Small Probability Bias Badih Ghazi Adversary-Based Parity Lower Bounds with Small Probability Bias 1 / 10

2 Setup Computing the parity function in the query model with error probability 1/2 q(n) where q(n) = o(1). Adversary-Based Parity Lower Bounds with Small Probability Bias 2 / 10

3 Setup Computing the parity function in the query model with error probability 1/2 q(n) where q(n) = o(1). Using the polynomial method: Ω(n) for any q(n) 0. Adversary-Based Parity Lower Bounds with Small Probability Bias 2 / 10

4 Setup Computing the parity function in the query model with error probability 1/2 q(n) where q(n) = o(1). Using the polynomial method: Ω(n) for any q(n) 0. Additive adversary arguments: Adversary-Based Parity Lower Bounds with Small Probability Bias 2 / 10

5 Setup Computing the parity function in the query model with error probability 1/2 q(n) where q(n) = o(1). Using the polynomial method: Ω(n) for any q(n) 0. Additive adversary arguments: Reichardt s characterization of Q(f ) in terms of Adv ± (f ) holds only in the bounded error case. Q 1/2 q(n) (Parity n ) Adv ± 1/2 q(n) (Parity n) = Ω((q(n)) 2 n) Adversary-Based Parity Lower Bounds with Small Probability Bias 2 / 10

6 Setup Computing the parity function in the query model with error probability 1/2 q(n) where q(n) = o(1). Using the polynomial method: Ω(n) for any q(n) 0. Additive adversary arguments: Reichardt s characterization of Q(f ) in terms of Adv ± (f ) holds only in the bounded error case. Q 1/2 q(n) (Parity n ) Adv ± 1/2 q(n) (Parity n) = Ω((q(n)) 2 n) Decays rapidly with q(n). Adversary-Based Parity Lower Bounds with Small Probability Bias 2 / 10

7 Setup Computing the parity function in the query model with error probability 1/2 q(n) where q(n) = o(1). Using the polynomial method: Ω(n) for any q(n) 0. Additive adversary arguments: Reichardt s characterization of Q(f ) in terms of Adv ± (f ) holds only in the bounded error case. Q 1/2 q(n) (Parity n ) Adv ± 1/2 q(n) (Parity n) = Ω((q(n)) 2 n) Decays rapidly with q(n). Gives a trivial constant bound even for q(n) = 1/ n. Adversary-Based Parity Lower Bounds with Small Probability Bias 2 / 10

8 Setup Computing the parity function in the query model with error probability 1/2 q(n) where q(n) = o(1). Using the polynomial method: Ω(n) for any q(n) 0. Additive adversary arguments: Reichardt s characterization of Q(f ) in terms of Adv ± (f ) holds only in the bounded error case. Q 1/2 q(n) (Parity n ) Adv ± 1/2 q(n) (Parity n) = Ω((q(n)) 2 n) Decays rapidly with q(n). Gives a trivial constant bound even for q(n) = 1/ n. Question: Can we get a better lower bound using adversary-based arguments? Adversary-Based Parity Lower Bounds with Small Probability Bias 2 / 10

9 Outline Adversary-Based Parity Lower Bounds with Small Probability Bias 3 / 10

10 Outline Show a lower bound of Ω(n) even for exponentially small q(n). Adversary-Based Parity Lower Bounds with Small Probability Bias 3 / 10

11 Outline Show a lower bound of Ω(n) even for exponentially small q(n). Proof is based on a quantum reduction to the t-fold search problem, with t = θ(n). Adversary-Based Parity Lower Bounds with Small Probability Bias 3 / 10

12 Outline Show a lower bound of Ω(n) even for exponentially small q(n). Proof is based on a quantum reduction to the t-fold search problem, with t = θ(n). Adaptation of the proof of Cleve et. al to our setup. Adversary-Based Parity Lower Bounds with Small Probability Bias 3 / 10

13 Outline Show a lower bound of Ω(n) even for exponentially small q(n). Proof is based on a quantum reduction to the t-fold search problem, with t = θ(n). Adaptation of the proof of Cleve et. al to our setup. Holds even for weak algorithms for parity. Adversary-Based Parity Lower Bounds with Small Probability Bias 3 / 10

14 The quantum reduction Notation For any S [n], χ S : Characteristic vector of S x S : Restriction of x to the subset S. Adversary-Based Parity Lower Bounds with Small Probability Bias 4 / 10

15 The quantum reduction Notation For any S [n], χ S : Characteristic vector of S x S : Restriction of x to the subset S. Observation [Scott Aaronson]: for all x {0, 1} n, we have 1 2 n ( 1) Parn(x S) H n χ S = x S [n] Adversary-Based Parity Lower Bounds with Small Probability Bias 4 / 10

16 The quantum reduction Notation For any S [n], χ S : Characteristic vector of S x S : Restriction of x to the subset S. Observation [Scott Aaronson]: for all x {0, 1} n, we have 1 2 n ( 1) Parn(x S) H n χ S = x S [n] Given an algorithm that produces such a superposition with r(n) queries, get an algorithm that recovers x with r(n) queries. Adversary-Based Parity Lower Bounds with Small Probability Bias 4 / 10

17 The quantum reduction Notation For any S [n], χ S : Characteristic vector of S x S : Restriction of x to the subset S. Observation [Scott Aaronson]: for all x {0, 1} n, we have 1 2 n ( 1) Parn(x S) H n χ S = x S [n] Given an algorithm that produces such a superposition with r(n) queries, get an algorithm that recovers x with r(n) queries. Need to deal with garbage. Adversary-Based Parity Lower Bounds with Small Probability Bias 4 / 10

18 The quantum reduction for coherent algorithms A parity algorithm is coherent if on inputs x and S, it takes the state x χ S z to x χ S z + Par n (x S ). Adversary-Based Parity Lower Bounds with Small Probability Bias 5 / 10

19 The quantum reduction for coherent algorithms A parity algorithm is coherent if on inputs x and S, it takes the state x χ S z to x χ S z + Par n (x S ). The reduction Start with the state x 0 n 1. Adversary-Based Parity Lower Bounds with Small Probability Bias 5 / 10

20 The quantum reduction for coherent algorithms A parity algorithm is coherent if on inputs x and S, it takes the state x χ S z to x χ S z + Par n (x S ). The reduction Start with the state x 0 n 1. Hadamard the last n + 1 qubits: 1 2 n+1 (z,χ S ) {0,1} n+1 ( 1) z x χ S z Adversary-Based Parity Lower Bounds with Small Probability Bias 5 / 10

21 The quantum reduction for coherent algorithms A parity algorithm is coherent if on inputs x and S, it takes the state x χ S z to x χ S z + Par n (x S ). The reduction Start with the state x 0 n 1. Hadamard the last n + 1 qubits: 1 2 n+1 (z,χ S ) {0,1} n+1 ( 1) z x χ S z Apply the coherent parity algorithm and Hadamard the last (n + 1) qubits: 1 2 n+1 (z,χ S ) {0,1} n+1 ( 1) z+parn(x S) x H n χ S H 1 z = x x 1 Adversary-Based Parity Lower Bounds with Small Probability Bias 5 / 10

22 The quantum reduction for coherent algorithms A parity algorithm is coherent if on inputs x and S, it takes the state x χ S z to x χ S z + Par n (x S ). The reduction Start with the state x 0 n 1. Hadamard the last n + 1 qubits: 1 2 n+1 (z,χ S ) {0,1} n+1 ( 1) z x χ S z Apply the coherent parity algorithm and Hadamard the last (n + 1) qubits: 1 2 n+1 (z,χ S ) {0,1} n+1 ( 1) z+parn(x S) x H n χ S H 1 z = x x 1 Measure the middle n qubits in the standard basis: get x with probability 1! Adversary-Based Parity Lower Bounds with Small Probability Bias 5 / 10

23 The quantum reduction for coherent algorithms Claim Let ΣO be any finite set. If there exists a coherent algorithm A that computes Parityn using r(n) queries, then for any function f : {0, 1} n Σ O, there is an algorithm B f that computes f exactly using r(n) queries. Adversary-Based Parity Lower Bounds with Small Probability Bias 6 / 10

24 The quantum reduction for general algorithms Claim Let t n 4e, t = θ(n). Let q(n) = Ω(e t/16 ) If A computes Parity n with error probability p x (n) for every x {0, 1} n and for all x with x = t, 1 2 n p x S (n) 1/2 q(n) S {0,1} n Then, A makes Ω(n) queries. Adversary-Based Parity Lower Bounds with Small Probability Bias 7 / 10

25 The quantum reduction for general algorithms Claim Let t n 4e, t = θ(n). Let q(n) = Ω(e t/16 ) If A computes Parity n with error probability p x (n) for every x {0, 1} n and for all x with x = t, Then, A makes Ω(n) queries. Corollary 1 2 n p x S (n) 1/2 q(n) S {0,1} n Q 1 2 e c n(parity n) = Ω(n) for any constant c Adversary-Based Parity Lower Bounds with Small Probability Bias 7 / 10

26 General parity algorithms A takes the state x χ S z 0 0 w to a x,s x χ S z Par n (x S ) J x,s + b x,s x χ S z Par n(x S ) K x,s where b x,s 2 = p x S (n), a x,s 2 + b x,s 2 = 1 and J x,s and K x,s are unit vectors. Adversary-Based Parity Lower Bounds with Small Probability Bias 8 / 10

27 General parity algorithms A takes the state x χ S z 0 0 w to a x,s x χ S z Par n (x S ) J x,s + b x,s x χ S z Par n(x S ) K x,s where b x,s 2 = p x S (n), a x,s 2 + b x,s 2 = 1 and J x,s and K x,s are unit vectors. Apply a CNOT gate and uncompute A: x χ S z + Par n (x S ) 0 (w+1) + 2b x,s M x,s,z where M x,s,z satisfies the properties M x,s,0 = M x,s,1 and { M x,s,0 } x,s is orthonormal. Adversary-Based Parity Lower Bounds with Small Probability Bias 8 / 10

28 General parity algorithms A takes the state x χ S z 0 0 w to a x,s x χ S z Par n (x S ) J x,s + b x,s x χ S z Par n(x S ) K x,s where b x,s 2 = p x S (n), a x,s 2 + b x,s 2 = 1 and J x,s and K x,s are unit vectors. Apply a CNOT gate and uncompute A: x χ S z + Par n (x S ) 0 (w+1) + 2b x,s M x,s,z where M x,s,z satisfies the properties M x,s,0 = M x,s,1 and { M x,s,0 } x,s is orthonormal. x χ S z + Par n (x S ) 0 (w+1) : Output of a coherent parity algorithm Not necessarily orthogonal to Mx,S,z Adversary-Based Parity Lower Bounds with Small Probability Bias 8 / 10

29 The quantum reduction for general algorithms Apply Hadamard gate, the above algorithm and another Hadamard gate: x x 1 0 (w+1) + ψ ψ 2 2 = 1 ( 1) z b 2 n x,s M x,s,z 2 2 (z,χ S ) {0,1} n+1 = 4 2 n p x S (n) χ S {0,1} n Adversary-Based Parity Lower Bounds with Small Probability Bias 9 / 10

30 The quantum reduction for general algorithms Apply Hadamard gate, the above algorithm and another Hadamard gate: x x 1 0 (w+1) + ψ ψ 2 2 = 1 ( 1) z b 2 n x,s M x,s,z 2 2 (z,χ S ) {0,1} n+1 = 4 2 n p x S (n) χ S {0,1} n Pr[Obtaining x] 4q 2 (n) whenever 1 2 n p x S (n) ( 1 2 q(n)) S {0,1} n Adversary-Based Parity Lower Bounds with Small Probability Bias 9 / 10

31 The quantum reduction for general algorithms Holevo s theorem? Adversary-Based Parity Lower Bounds with Small Probability Bias 10 / 10

32 The quantum reduction for general algorithms Holevo s theorem? n queries to the oracle might give n log n classical bits of information. Adversary-Based Parity Lower Bounds with Small Probability Bias 10 / 10

33 The quantum reduction for general algorithms Holevo s theorem? n queries to the oracle might give n log n classical bits of information. The t-fold search problem Given x {0, 1} n and promised that x = t, find the subset J [n] of 1 s of x. Adversary-Based Parity Lower Bounds with Small Probability Bias 10 / 10

34 The quantum reduction for general algorithms Holevo s theorem? n queries to the oracle might give n log n classical bits of information. The t-fold search problem Given x {0, 1} n and promised that x = t, find the subset J [n] of 1 s of x. For every t n 4e and every ɛ = 1 Ω(e t/8 ), Q ɛ (t-fold search) = Ω( tn). Proof using the earliest version of the multiplicative adversary method(ambianis 2005, Spalek 2007) Adversary-Based Parity Lower Bounds with Small Probability Bias 10 / 10

35 The quantum reduction for general algorithms Holevo s theorem? n queries to the oracle might give n log n classical bits of information. The t-fold search problem Given x {0, 1} n and promised that x = t, find the subset J [n] of 1 s of x. For every t n 4e and every ɛ = 1 Ω(e t/8 ), Q ɛ (t-fold search) = Ω( tn). Proof using the earliest version of the multiplicative adversary method(ambianis 2005, Spalek 2007) Conclude: The claim holds for all q(n) = Ω(e t/16 ). Adversary-Based Parity Lower Bounds with Small Probability Bias 10 / 10

Adversary-Based Parity Lower Bounds with Small Probability Bias

Adversary-Based Parity Lower Bounds with Small Probability Bias Adversary-Based Parity Lower Bounds with Small Probability Bias Badih Ghazi badih@mit.edu Introduction The quantum query complexity of the parity function on n variables is known to be exactly n/2, for

More information

Lecture 13: Lower Bounds using the Adversary Method. 2 The Super-Basic Adversary Method [Amb02]

Lecture 13: Lower Bounds using the Adversary Method. 2 The Super-Basic Adversary Method [Amb02] Quantum Computation (CMU 18-859BB, Fall 015) Lecture 13: Lower Bounds using the Adversary Method October 1, 015 Lecturer: Ryan O Donnell Scribe: Kumail Jaffer 1 Introduction There are a number of known

More information

From Adversaries to Algorithms. Troy Lee Rutgers University

From Adversaries to Algorithms. Troy Lee Rutgers University From Adversaries to Algorithms Troy Lee Rutgers University Quantum Query Complexity As in classical complexity, it is difficult to show lower bounds on the time or number of gates required to solve a problem

More information

Quantum algorithms (CO 781/CS 867/QIC 823, Winter 2013) Andrew Childs, University of Waterloo LECTURE 13: Query complexity and the polynomial method

Quantum algorithms (CO 781/CS 867/QIC 823, Winter 2013) Andrew Childs, University of Waterloo LECTURE 13: Query complexity and the polynomial method Quantum algorithms (CO 781/CS 867/QIC 823, Winter 2013) Andrew Childs, University of Waterloo LECTURE 13: Query complexity and the polynomial method So far, we have discussed several different kinds of

More information

Simulation of quantum computers with probabilistic models

Simulation of quantum computers with probabilistic models Simulation of quantum computers with probabilistic models Vlad Gheorghiu Department of Physics Carnegie Mellon University Pittsburgh, PA 15213, U.S.A. April 6, 2010 Vlad Gheorghiu (CMU) Simulation of quantum

More information

Fourier Sampling & Simon s Algorithm

Fourier Sampling & Simon s Algorithm Chapter 4 Fourier Sampling & Simon s Algorithm 4.1 Reversible Computation A quantum circuit acting on n qubits is described by an n n unitary operator U. Since U is unitary, UU = U U = I. This implies

More information

Introduction to Quantum Algorithms Part I: Quantum Gates and Simon s Algorithm

Introduction to Quantum Algorithms Part I: Quantum Gates and Simon s Algorithm Part I: Quantum Gates and Simon s Algorithm Martin Rötteler NEC Laboratories America, Inc. 4 Independence Way, Suite 00 Princeton, NJ 08540, U.S.A. International Summer School on Quantum Information, Max-Planck-Institut

More information

Quantum algorithms based on span programs

Quantum algorithms based on span programs Quantum algorithms based on span programs Ben Reichardt IQC, U Waterloo [arxiv:0904.2759] Model: Complexity measure: Quantum algorithms Black-box query complexity Span programs Witness size [KW 93] [RŠ

More information

Quantum Searching. Robert-Jan Slager and Thomas Beuman. 24 november 2009

Quantum Searching. Robert-Jan Slager and Thomas Beuman. 24 november 2009 Quantum Searching Robert-Jan Slager and Thomas Beuman 24 november 2009 1 Introduction Quantum computers promise a significant speed-up over classical computers, since calculations can be done simultaneously.

More information

Introduction to Quantum Computing

Introduction to Quantum Computing Introduction to Quantum Computing Petros Wallden Lecture 7: Complexity & Algorithms I 13th October 016 School of Informatics, University of Edinburgh Complexity - Computational Complexity: Classification

More information

Introduction to Quantum Computing

Introduction to Quantum Computing Introduction to Quantum Computing Part II Emma Strubell http://cs.umaine.edu/~ema/quantum_tutorial.pdf April 13, 2011 Overview Outline Grover s Algorithm Quantum search A worked example Simon s algorithm

More information

Time-Efficient Quantum Walks for 3-Distinctness

Time-Efficient Quantum Walks for 3-Distinctness Time-Efficient Quantum Walks for 3-Distinctness Aleksandrs Belovs 1, Andrew M. Childs 2,4, Stacey Jeffery 3,4, Robin Kothari 3,4, and Frédéric Magniez 5 1 Faculty of Computing, University of Latvia 2 Department

More information

6.896 Quantum Complexity Theory Oct. 28, Lecture 16

6.896 Quantum Complexity Theory Oct. 28, Lecture 16 6.896 Quantum Complexity Theory Oct. 28, 2008 Lecturer: Scott Aaronson Lecture 16 1 Recap Last time we introduced the complexity class QMA (quantum Merlin-Arthur), which is a quantum version for NP. In

More information

Introduction to Quantum Information Processing

Introduction to Quantum Information Processing Introduction to Quantum Information Processing Lecture 6 Richard Cleve Overview of Lecture 6 Continuation of teleportation Computation and some basic complexity classes Simple quantum algorithms in the

More information

QUANTUM COMPUTATION. Exercise sheet 1. Ashley Montanaro, University of Bristol H Z U = 1 2

QUANTUM COMPUTATION. Exercise sheet 1. Ashley Montanaro, University of Bristol H Z U = 1 2 School of Mathematics Spring 017 QUANTUM COMPUTATION Exercise sheet 1 Ashley Montanaro, University of Bristol ashley.montanaro@bristol.ac.uk 1. The quantum circuit model. (a) Consider the following quantum

More information

Quantum Query Complexity of Boolean Functions with Small On-Sets

Quantum Query Complexity of Boolean Functions with Small On-Sets Quantum Query Complexity of Boolean Functions with Small On-Sets Seiichiro Tani TT/JST ERATO-SORST. Joint work with Andris Ambainis Univ. of Latvia Kazuo Iwama Kyoto Univ. Masaki akanishi AIST. Harumichi

More information

Compute the Fourier transform on the first register to get x {0,1} n x 0.

Compute the Fourier transform on the first register to get x {0,1} n x 0. CS 94 Recursive Fourier Sampling, Simon s Algorithm /5/009 Spring 009 Lecture 3 1 Review Recall that we can write any classical circuit x f(x) as a reversible circuit R f. We can view R f as a unitary

More information

Lecture 21: Quantum communication complexity

Lecture 21: Quantum communication complexity CPSC 519/619: Quantum Computation John Watrous, University of Calgary Lecture 21: Quantum communication complexity April 6, 2006 In this lecture we will discuss how quantum information can allow for a

More information

Quantum Lower Bound for Recursive Fourier Sampling

Quantum Lower Bound for Recursive Fourier Sampling Quantum Lower Bound for Recursive Fourier Sampling Scott Aaronson Institute for Advanced Study, Princeton aaronson@ias.edu Abstract One of the earliest quantum algorithms was discovered by Bernstein and

More information

Single qubit + CNOT gates

Single qubit + CNOT gates Lecture 6 Universal quantum gates Single qubit + CNOT gates Single qubit and CNOT gates together can be used to implement an arbitrary twolevel unitary operation on the state space of n qubits. Suppose

More information

Uncloneable Quantum Money

Uncloneable Quantum Money 1 Institute for Quantum Computing University of Waterloo Joint work with Michele Mosca CQISC 2006 1 Supported by NSERC, Sun Microsystems, CIAR, CFI, CSE, MITACS, ORDCF. Outline Introduction Requirements

More information

The Quantum Query Complexity of Algebraic Properties

The Quantum Query Complexity of Algebraic Properties The Quantum Query Complexity of Algebraic Properties Sebastian Dörn Institut für Theoretische Informatik Universität Ulm 89069 Ulm, Germany Thomas Thierauf Fak. Elektronik und Informatik HTW Aalen 73430

More information

Quantum information and quantum computing

Quantum information and quantum computing Middle East Technical University, Department of Physics January 7, 009 Outline Measurement 1 Measurement 3 Single qubit gates Multiple qubit gates 4 Distinguishability 5 What s measurement? Quantum measurement

More information

An Introduction to Quantum Information and Applications

An Introduction to Quantum Information and Applications An Introduction to Quantum Information and Applications Iordanis Kerenidis CNRS LIAFA-Univ Paris-Diderot Quantum information and computation Quantum information and computation How is information encoded

More information

Ph 219b/CS 219b. Exercises Due: Wednesday 4 December 2013

Ph 219b/CS 219b. Exercises Due: Wednesday 4 December 2013 1 Ph 219b/CS 219b Exercises Due: Wednesday 4 December 2013 4.1 The peak in the Fourier transform In the period finding algorithm we prepared the periodic state A 1 1 x 0 + jr, (1) A j=0 where A is the

More information

Advanced Cryptography Quantum Algorithms Christophe Petit

Advanced Cryptography Quantum Algorithms Christophe Petit The threat of quantum computers Advanced Cryptography Quantum Algorithms Christophe Petit University of Oxford Christophe Petit -Advanced Cryptography 1 Christophe Petit -Advanced Cryptography 2 The threat

More information

b) (5 points) Give a simple quantum circuit that transforms the state

b) (5 points) Give a simple quantum circuit that transforms the state C/CS/Phy191 Midterm Quiz Solutions October 0, 009 1 (5 points) Short answer questions: a) (5 points) Let f be a function from n bits to 1 bit You have a quantum circuit U f for computing f If you wish

More information

Richard Cleve David R. Cheriton School of Computer Science Institute for Quantum Computing University of Waterloo

Richard Cleve David R. Cheriton School of Computer Science Institute for Quantum Computing University of Waterloo CS 497 Frontiers of Computer Science Introduction to Quantum Computing Lecture of http://www.cs.uwaterloo.ca/~cleve/cs497-f7 Richard Cleve David R. Cheriton School of Computer Science Institute for Quantum

More information

6.896 Quantum Complexity Theory November 4th, Lecture 18

6.896 Quantum Complexity Theory November 4th, Lecture 18 6.896 Quantum Complexity Theory November 4th, 2008 Lecturer: Scott Aaronson Lecture 18 1 Last Time: Quantum Interactive Proofs 1.1 IP = PSPACE QIP = QIP(3) EXP The first result is interesting, because

More information

Quantum Computing Lecture 6. Quantum Search

Quantum Computing Lecture 6. Quantum Search Quantum Computing Lecture 6 Quantum Search Maris Ozols Grover s search problem One of the two most important algorithms in quantum computing is Grover s search algorithm (invented by Lov Grover in 1996)

More information

Extended Superposed Quantum State Initialization Using Disjoint Prime Implicants

Extended Superposed Quantum State Initialization Using Disjoint Prime Implicants Extended Superposed Quantum State Initialization Using Disjoint Prime Implicants David Rosenbaum, Marek Perkowski Portland State University, Department of Computer Science Portland State University, Department

More information

Quantum algorithms (CO 781, Winter 2008) Prof. Andrew Childs, University of Waterloo LECTURE 1: Quantum circuits and the abelian QFT

Quantum algorithms (CO 781, Winter 2008) Prof. Andrew Childs, University of Waterloo LECTURE 1: Quantum circuits and the abelian QFT Quantum algorithms (CO 78, Winter 008) Prof. Andrew Childs, University of Waterloo LECTURE : Quantum circuits and the abelian QFT This is a course on quantum algorithms. It is intended for graduate students

More information

An Introduction to Quantum Computation and Quantum Information

An Introduction to Quantum Computation and Quantum Information An to and Graduate Group in Applied Math University of California, Davis March 13, 009 A bit of history Benioff 198 : First paper published mentioning quantum computing Feynman 198 : Use a quantum computer

More information

The Polynomial Method Strikes Back: Tight Quantum Query Bounds Via Dual Polynomials

The Polynomial Method Strikes Back: Tight Quantum Query Bounds Via Dual Polynomials The Polynomial Method Strikes Back: Tight Quantum Query Bounds Via Dual Polynomials Justin Thaler (Georgetown) Joint work with: Mark Bun (Princeton) Robin Kothari (MSR Redmond) Boolean Functions Boolean

More information

Chapter 10. Quantum algorithms

Chapter 10. Quantum algorithms Chapter 10. Quantum algorithms Complex numbers: a quick review Definition: C = { a + b i : a, b R } where i = 1. Polar form of z = a + b i is z = re iθ, where r = z = a 2 + b 2 and θ = tan 1 y x Alternatively,

More information

Lecture 9: Phase Estimation

Lecture 9: Phase Estimation CS 880: Quantum Information Processing 9/3/010 Lecture 9: Phase Estimation Instructor: Dieter van Melkebeek Scribe: Hesam Dashti Last lecture we reviewed the classical setting of the Fourier Transform

More information

. An introduction to Quantum Complexity. Peli Teloni

. An introduction to Quantum Complexity. Peli Teloni An introduction to Quantum Complexity Peli Teloni Advanced Topics on Algorithms and Complexity µπλ July 3, 2014 1 / 50 Outline 1 Motivation 2 Computational Model Quantum Circuits Quantum Turing Machine

More information

Chebyshev Polynomials, Approximate Degree, and Their Applications

Chebyshev Polynomials, Approximate Degree, and Their Applications Chebyshev Polynomials, Approximate Degree, and Their Applications Justin Thaler 1 Georgetown University Boolean Functions Boolean function f : { 1, 1} n { 1, 1} AND n (x) = { 1 (TRUE) if x = ( 1) n 1 (FALSE)

More information

6.896 Quantum Complexity Theory October 2, Lecture 9

6.896 Quantum Complexity Theory October 2, Lecture 9 6896 Quantum Complexity heory October, 008 Lecturer: Scott Aaronson Lecture 9 In this class we discuss Grover s search algorithm as well as the BBBV proof that it is optimal 1 Grover s Algorithm 11 Setup

More information

Simulating classical circuits with quantum circuits. The complexity class Reversible-P. Universal gate set for reversible circuits P = Reversible-P

Simulating classical circuits with quantum circuits. The complexity class Reversible-P. Universal gate set for reversible circuits P = Reversible-P Quantum Circuits Based on notes by John Watrous and also Sco8 Aaronson: www.sco8aaronson.com/democritus/ John Preskill: www.theory.caltech.edu/people/preskill/ph229 Outline Simulating classical circuits

More information

Quantum Algorithms for Finding Constant-sized Sub-hypergraphs

Quantum Algorithms for Finding Constant-sized Sub-hypergraphs Quantum Algorithms for Finding Constant-sized Sub-hypergraphs Seiichiro Tani (Joint work with François Le Gall and Harumichi Nishimura) NTT Communication Science Labs., NTT Corporation, Japan. The 20th

More information

1 Bernstein-Vazirani Algorithm

1 Bernstein-Vazirani Algorithm CMSC 33001: Novel Computing Architectures and Technologies Lecturer: Yongshan Ding, Pranav Gokhale Scribe: Shankar G. Menon Lecture 08: More on Algorithms November 1, 018 1 Bernstein-Vazirani Algorithm

More information

The quantum query complexity of read-many formulas

The quantum query complexity of read-many formulas The quantum query complexity of read-many formulas Andrew Childs Waterloo Shelby Kimmel MIT Robin Kothari Waterloo Boolean formulas ^ x 1 x 2 _ x 3 ^ x 1 x 3 A formula is read-once if every input appears

More information

6. Quantum error correcting codes

6. Quantum error correcting codes 6. Quantum error correcting codes Error correcting codes (A classical repetition code) Preserving the superposition Parity check Phase errors CSS 7-qubit code (Steane code) Too many error patterns? Syndrome

More information

Lecture 3: Hilbert spaces, tensor products

Lecture 3: Hilbert spaces, tensor products CS903: Quantum computation and Information theory (Special Topics In TCS) Lecture 3: Hilbert spaces, tensor products This lecture will formalize many of the notions introduced informally in the second

More information

Complex numbers: a quick review. Chapter 10. Quantum algorithms. Definition: where i = 1. Polar form of z = a + b i is z = re iθ, where

Complex numbers: a quick review. Chapter 10. Quantum algorithms. Definition: where i = 1. Polar form of z = a + b i is z = re iθ, where Chapter 0 Quantum algorithms Complex numbers: a quick review / 4 / 4 Definition: C = { a + b i : a, b R } where i = Polar form of z = a + b i is z = re iθ, where r = z = a + b and θ = tan y x Alternatively,

More information

Improved Quantum Algorithm for Triangle Finding via Combinatorial Arguments

Improved Quantum Algorithm for Triangle Finding via Combinatorial Arguments Improved Quantum Algorithm for Triangle Finding via Combinatorial Arguments François Le Gall The University of Tokyo Technical version available at arxiv:1407.0085 [quant-ph]. Background. Triangle finding

More information

Lecture 2: From Classical to Quantum Model of Computation

Lecture 2: From Classical to Quantum Model of Computation CS 880: Quantum Information Processing 9/7/10 Lecture : From Classical to Quantum Model of Computation Instructor: Dieter van Melkebeek Scribe: Tyson Williams Last class we introduced two models for deterministic

More information

Quantum Communication

Quantum Communication Quantum Communication Harry Buhrman CWI & University of Amsterdam Physics and Computing Computing is physical Miniaturization quantum effects Quantum Computers ) Enables continuing miniaturization ) Fundamentally

More information

Lecture 4: Elementary Quantum Algorithms

Lecture 4: Elementary Quantum Algorithms CS 880: Quantum Information Processing 9/13/010 Lecture 4: Elementary Quantum Algorithms Instructor: Dieter van Melkebeek Scribe: Kenneth Rudinger This lecture introduces several simple quantum algorithms.

More information

Quantum Computing: Foundations to Frontier Fall Lecture 3

Quantum Computing: Foundations to Frontier Fall Lecture 3 Quantum Computing: Foundations to Frontier Fall 018 Lecturer: Henry Yuen Lecture 3 Scribes: Seyed Sajjad Nezhadi, Angad Kalra Nora Hahn, David Wandler 1 Overview In Lecture 3, we started off talking about

More information

Optimal Hamiltonian Simulation by Quantum Signal Processing

Optimal Hamiltonian Simulation by Quantum Signal Processing Optimal Hamiltonian Simulation by Quantum Signal Processing Guang-Hao Low, Isaac L. Chuang Massachusetts Institute of Technology QIP 2017 January 19 1 Physics Computation Physical concepts inspire problem-solving

More information

Introduction to Quantum Information Processing QIC 710 / CS 768 / PH 767 / CO 681 / AM 871

Introduction to Quantum Information Processing QIC 710 / CS 768 / PH 767 / CO 681 / AM 871 Introduction to Quantum Information Processing QIC 710 / CS 768 / PH 767 / CO 681 / AM 871 Lecture 1 (2017) Jon Yard QNC 3126 jyard@uwaterloo.ca TAs Nitica Sakharwade nsakharwade@perimeterinstitute.ca

More information

Lecture 4: LMN Learning (Part 2)

Lecture 4: LMN Learning (Part 2) CS 294-114 Fine-Grained Compleity and Algorithms Sept 8, 2015 Lecture 4: LMN Learning (Part 2) Instructor: Russell Impagliazzo Scribe: Preetum Nakkiran 1 Overview Continuing from last lecture, we will

More information

Reflections Reflections

Reflections Reflections Reflections Reflections for quantum query algorithms Ben Reichardt University of Waterloo Reflections Reflections for quantum query algorithms Ben Reichardt University of Waterloo Reflections for quantum

More information

Principles of Quantum Mechanics Pt. 2

Principles of Quantum Mechanics Pt. 2 Principles of Quantum Mechanics Pt. 2 PHYS 500 - Southern Illinois University February 9, 2017 PHYS 500 - Southern Illinois University Principles of Quantum Mechanics Pt. 2 February 9, 2017 1 / 13 The

More information

C/CS/Phys C191 Grover s Quantum Search Algorithm 11/06/07 Fall 2007 Lecture 21

C/CS/Phys C191 Grover s Quantum Search Algorithm 11/06/07 Fall 2007 Lecture 21 C/CS/Phys C191 Grover s Quantum Search Algorithm 11/06/07 Fall 2007 Lecture 21 1 Readings Benenti et al, Ch 310 Stolze and Suter, Quantum Computing, Ch 84 ielsen and Chuang, Quantum Computation and Quantum

More information

α x x 0 α x x f(x) α x x α x ( 1) f(x) x f(x) x f(x) α x = α x x 2

α x x 0 α x x f(x) α x x α x ( 1) f(x) x f(x) x f(x) α x = α x x 2 Quadratic speedup for unstructured search - Grover s Al- CS 94- gorithm /8/07 Spring 007 Lecture 11 01 Unstructured Search Here s the problem: You are given an efficient boolean function f : {1,,} {0,1},

More information

Quantum Communication Complexity

Quantum Communication Complexity Quantum Communication Complexity Ronald de Wolf Communication complexity has been studied extensively in the area of theoretical computer science and has deep connections with seemingly unrelated areas,

More information

. Here we are using the standard inner-product over C k to define orthogonality. Recall that the inner-product of two vectors φ = i α i.

. Here we are using the standard inner-product over C k to define orthogonality. Recall that the inner-product of two vectors φ = i α i. CS 94- Hilbert Spaces, Tensor Products, Quantum Gates, Bell States 1//07 Spring 007 Lecture 01 Hilbert Spaces Consider a discrete quantum system that has k distinguishable states (eg k distinct energy

More information

Introduction into Quantum Computations Alexei Ashikhmin Bell Labs

Introduction into Quantum Computations Alexei Ashikhmin Bell Labs Introduction into Quantum Computations Alexei Ashikhmin Bell Labs Workshop on Quantum Computing and its Application March 16, 2017 Qubits Unitary transformations Quantum Circuits Quantum Measurements Quantum

More information

6.896 Quantum Complexity Theory November 11, Lecture 20

6.896 Quantum Complexity Theory November 11, Lecture 20 6.896 Quantum Complexity Theory November, 2008 Lecturer: Scott Aaronson Lecture 20 Last Time In the previous lecture, we saw the result of Aaronson and Watrous that showed that in the presence of closed

More information

Short introduction to Quantum Computing

Short introduction to Quantum Computing November 7, 2017 Short introduction to Quantum Computing Joris Kattemölle QuSoft, CWI, Science Park 123, Amsterdam, The Netherlands Institute for Theoretical Physics, University of Amsterdam, Science Park

More information

Quantum Computation. Michael A. Nielsen. University of Queensland

Quantum Computation. Michael A. Nielsen. University of Queensland Quantum Computation Michael A. Nielsen University of Queensland Goals: 1. To eplain the quantum circuit model of computation. 2. To eplain Deutsch s algorithm. 3. To eplain an alternate model of quantum

More information

Ph 219b/CS 219b. Exercises Due: Wednesday 22 February 2006

Ph 219b/CS 219b. Exercises Due: Wednesday 22 February 2006 1 Ph 219b/CS 219b Exercises Due: Wednesday 22 February 2006 6.1 Estimating the trace of a unitary matrix Recall that using an oracle that applies the conditional unitary Λ(U), Λ(U): 0 ψ 0 ψ, 1 ψ 1 U ψ

More information

STRONG DIRECT PRODUCT THEOREMS FOR QUANTUM COMMUNICATION AND QUERY COMPLEXITY

STRONG DIRECT PRODUCT THEOREMS FOR QUANTUM COMMUNICATION AND QUERY COMPLEXITY STRONG DIRECT PRODUCT THEOREMS FOR QUANTUM COMMUNICATION AND QUERY COMPLEXITY ALEXANDER A. SHERSTOV Abstract. A strong direct product theorem SDPT) states that solving n instances of a problem requires

More information

Quantum Algorithms Lecture #2. Stephen Jordan

Quantum Algorithms Lecture #2. Stephen Jordan Quantum Algorithms Lecture #2 Stephen Jordan Last Time Defined quantum circuit model. Argued it captures all of quantum computation. Developed some building blocks: Gate universality Controlled-unitaries

More information

arxiv: v3 [quant-ph] 18 Nov 2008

arxiv: v3 [quant-ph] 18 Nov 2008 Span-program-based quantum algorithm for evaluating formulas Ben W. Reichardt Robert Špalek arxiv:0710.2630v3 [quant-ph] 18 Nov 2008 Abstract We give a quantum algorithm for evaluating formulas over an

More information

On the query complexity of counterfeiting quantum money

On the query complexity of counterfeiting quantum money On the query complexity of counterfeiting quantum money Andrew Lutomirski December 14, 2010 Abstract Quantum money is a quantum cryptographic protocol in which a mint can produce a state (called a quantum

More information

Quantum algorithms. Andrew Childs. Institute for Quantum Computing University of Waterloo

Quantum algorithms. Andrew Childs. Institute for Quantum Computing University of Waterloo Quantum algorithms Andrew Childs Institute for Quantum Computing University of Waterloo 11th Canadian Summer School on Quantum Information 8 9 June 2011 Based in part on slides prepared with Pawel Wocjan

More information

Bounds for Error Reduction with Few Quantum Queries

Bounds for Error Reduction with Few Quantum Queries Bounds for Error Reduction with Few Quantum Queries Sourav Chakraborty, Jaikumar Radhakrishnan 2,3, and andakumar Raghunathan Department of Computer Science, University of Chicago, Chicago, IL 60637, USA

More information

THE RANK METHOD AND APPLICATIONS TO POST- QUANTUM CRYPTOGRAPHY

THE RANK METHOD AND APPLICATIONS TO POST- QUANTUM CRYPTOGRAPHY THE RANK METHOD AND APPLICATIONS TO POST- QUANTUM CRYPTOGRAPHY Mark Zhandry - Stanford University Joint work with Dan Boneh Classical Cryptography Post-Quantum Cryptography All communication stays classical

More information

Lecture 7: Quantum Fourier Transform over Z N

Lecture 7: Quantum Fourier Transform over Z N Quantum Computation (CMU 18-859BB, Fall 015) Lecture 7: Quantum Fourier Transform over Z September 30, 015 Lecturer: Ryan O Donnell Scribe: Chris Jones 1 Overview Last time, we talked about two main topics:

More information

Grover s algorithm. We want to find aa. Search in an unordered database. QC oracle (as usual) Usual trick

Grover s algorithm. We want to find aa. Search in an unordered database. QC oracle (as usual) Usual trick Grover s algorithm Search in an unordered database Example: phonebook, need to find a person from a phone number Actually, something else, like hard (e.g., NP-complete) problem 0, xx aa Black box ff xx

More information

6.896 Quantum Complexity Theory September 18, Lecture 5

6.896 Quantum Complexity Theory September 18, Lecture 5 6.896 Quantum Complexity Theory September 18, 008 Lecturer: Scott Aaronson Lecture 5 Last time we looked at what s known about quantum computation as it relates to classical complexity classes. Today we

More information

The Quantum Query Complexity of the Determinant

The Quantum Query Complexity of the Determinant The Quantum Query Complexity of the Determinant Sebastian Dörn Inst. für Theoretische Informatik Universität Ulm 89069 Ulm, Germany Thomas Thierauf Fak. Elektronik und Informatik HTW Aalen 73430 Aalen,

More information

CS257 Discrete Quantum Computation

CS257 Discrete Quantum Computation CS57 Discrete Quantum Computation John E Savage April 30, 007 Lect 11 Quantum Computing c John E Savage Classical Computation State is a vector of reals; e.g. Booleans, positions, velocities, or momenta.

More information

Limitations on transversal gates

Limitations on transversal gates Limitations on transversal gates Michael Newman 1 and Yaoyun Shi 1,2 University of Michigan 1, Alibaba Group 2 February 6, 2018 Quantum fault-tolerance Quantum fault-tolerance Quantum fault-tolerance Quantum

More information

On The Complexity of Quantum Circuit Manipulation

On The Complexity of Quantum Circuit Manipulation On The Complexity of Quantum Circuit Manipulation Vincent Liew 1 Introduction The stabilizer class of circuits, introduced by Daniel Gottesman, consists of quantum circuits in which every gate is a controlled-not

More information

Exponential Quantum Speed-ups are Generic

Exponential Quantum Speed-ups are Generic Exponential Quantum Speed-ups are Generic Fernando GSL Brandão 1 and Michał Horodecki 2 1 Universidade Federal de Minas Gerais, Brazil 2 University of Gdansk, Poland The Role of Fourier Transform in Quantum

More information

On the tightness of the Buhrman-Cleve-Wigderson simulation

On the tightness of the Buhrman-Cleve-Wigderson simulation On the tightness of the Buhrman-Cleve-Wigderson simulation Shengyu Zhang Department of Computer Science and Engineering, The Chinese University of Hong Kong. syzhang@cse.cuhk.edu.hk Abstract. Buhrman,

More information

arxiv: v3 [quant-ph] 3 Jul 2012

arxiv: v3 [quant-ph] 3 Jul 2012 MIT-CTP 4242 Super-Polynomial Quantum Speed-ups for Boolean Evaluation Trees with Hidden Structure Bohua Zhan Shelby Kimmel Avinatan Hassidim November 2, 2018 arxiv:1101.0796v3 [quant-ph] 3 Jul 2012 Abstract

More information

Seminar 1. Introduction to Quantum Computing

Seminar 1. Introduction to Quantum Computing Seminar 1 Introduction to Quantum Computing Before going in I am also a beginner in this field If you are interested, you can search more using: Quantum Computing since Democritus (Scott Aaronson) Quantum

More information

Quantum Random Access Memory

Quantum Random Access Memory Quantum Random Access Memory Carsten Neumann 26.07.2018 What is a Random Access Memory? A Random Access Memory (RAM) is used to store information in an array of memory cells. Each of these cells can be

More information

arxiv: v1 [quant-ph] 9 Jul 2009

arxiv: v1 [quant-ph] 9 Jul 2009 Span-program-based quantum algorithm for evaluating unbalanced formulas Ben W. Reichardt arxiv:0907.622v [quant-ph] 9 Jul 2009 Abstract The formula-evaluation problem is defined recursively. A formula

More information

Ph 219b/CS 219b. Exercises Due: Wednesday 20 November 2013

Ph 219b/CS 219b. Exercises Due: Wednesday 20 November 2013 1 h 219b/CS 219b Exercises Due: Wednesday 20 November 2013 3.1 Universal quantum gates I In this exercise and the two that follow, we will establish that several simple sets of gates are universal for

More information

92 CHAPTER III. QUANTUM COMPUTATION. Figure III.11: Diagram for swap (from NC).

92 CHAPTER III. QUANTUM COMPUTATION. Figure III.11: Diagram for swap (from NC). 92 CHAPTER III. QUANTUM COMPUTATION Figure III.11: Diagram for swap (from NC). C.3 Quantum circuits 1. Quantum circuit: A quantum circuit isa sequential seriesofquantum transformations on a quantum register.

More information

Introduction to Quantum Computing

Introduction to Quantum Computing Introduction to Quantum Computing Part I Emma Strubell http://cs.umaine.edu/~ema/quantum_tutorial.pdf April 12, 2011 Overview Outline What is quantum computing? Background Caveats Fundamental differences

More information

arxiv:quant-ph/ v1 29 May 2003

arxiv:quant-ph/ v1 29 May 2003 Quantum Lower Bounds for Collision and Element Distinctness with Small Range arxiv:quant-ph/0305179v1 29 May 2003 Andris Ambainis Abstract We give a general method for proving quantum lower bounds for

More information

Tutorial on Quantum Computing. Vwani P. Roychowdhury. Lecture 1: Introduction

Tutorial on Quantum Computing. Vwani P. Roychowdhury. Lecture 1: Introduction Tutorial on Quantum Computing Vwani P. Roychowdhury Lecture 1: Introduction 1 & ) &! # Fundamentals Qubits A single qubit is a two state system, such as a two level atom we denote two orthogonal states

More information

Asymptotic Analysis. Slides by Carl Kingsford. Jan. 27, AD Chapter 2

Asymptotic Analysis. Slides by Carl Kingsford. Jan. 27, AD Chapter 2 Asymptotic Analysis Slides by Carl Kingsford Jan. 27, 2014 AD Chapter 2 Independent Set Definition (Independent Set). Given a graph G = (V, E) an independent set is a set S V if no two nodes in S are joined

More information

Lower Bounds on Quantum Query Complexity

Lower Bounds on Quantum Query Complexity Lower Bounds on Quantum Query Complexity Peter Høyer hoyer@cpsc.ucalgary.ca Robert Špalek sr@cwi.nl arxiv:quant-ph/0509153v1 21 Sep 2005 September 2005 Abstract Shor s and Grover s famous quantum algorithms

More information

Fourier analysis of boolean functions in quantum computation

Fourier analysis of boolean functions in quantum computation Fourier analysis of boolean functions in quantum computation Ashley Montanaro Centre for Quantum Information and Foundations, Department of Applied Mathematics and Theoretical Physics, University of Cambridge

More information

Quantum Information & Quantum Computation

Quantum Information & Quantum Computation CS90A, Spring 005: Quantum Information & Quantum Computation Wim van Dam Engineering, Room 509 vandam@cs http://www.cs.ucsb.edu/~vandam/teaching/cs90/ Administrative The Final Examination will be: Monday

More information

Shor s Prime Factorization Algorithm

Shor s Prime Factorization Algorithm Shor s Prime Factorization Algorithm Bay Area Quantum Computing Meetup - 08/17/2017 Harley Patton Outline Why is factorization important? Shor s Algorithm Reduction to Order Finding Order Finding Algorithm

More information

arxiv: v1 [cs.cc] 16 Mar 2017

arxiv: v1 [cs.cc] 16 Mar 2017 A Nearly Optimal Lower Bound on the Approximate Degree of AC 0 Mark Bun mbun@cs.princeton.edu Justin Thaler justin.thaler@georgetown.edu arxiv:1703.05784v1 [cs.cc] 16 Mar 2017 Abstract The approximate

More information

Lecture 24: Goldreich-Levin Hardcore Predicate. Goldreich-Levin Hardcore Predicate

Lecture 24: Goldreich-Levin Hardcore Predicate. Goldreich-Levin Hardcore Predicate Lecture 24: : Intuition A One-way Function: A function that is easy to compute but hard to invert (efficiently) Hardcore-Predicate: A secret bit that is hard to compute Theorem (Goldreich-Levin) If f :

More information

On Quantum Indifferentiability

On Quantum Indifferentiability On Quantum Indifferentiability Tore Vincent Carstens, Ehsan Ebrahimi, Gelo Noel Tabia, and Dominique Unruh University of Tartu, Estonia March 8, 2018 Abstract We study the indifferentiability of classical

More information

Lower bounds for Quantum Computation and Communication. Ashwin V. Nayak. B.Tech. (Indian Institute of Technology, Kanpur) 1995

Lower bounds for Quantum Computation and Communication. Ashwin V. Nayak. B.Tech. (Indian Institute of Technology, Kanpur) 1995 Lower bounds for Quantum Computation and Communication by Ashwin V. Nayak B.Tech. (Indian Institute of Technology, Kanpur) 1995 A dissertation submitted in partial satisfaction of the requirements for

More information

Goldreich-Levin Hardcore Predicate. Lecture 28: List Decoding Hadamard Code and Goldreich-L

Goldreich-Levin Hardcore Predicate. Lecture 28: List Decoding Hadamard Code and Goldreich-L Lecture 28: List Decoding Hadamard Code and Goldreich-Levin Hardcore Predicate Recall Let H : {0, 1} n {+1, 1} Let: L ε = {S : χ S agrees with H at (1/2 + ε) fraction of points} Given oracle access to

More information