Adversary-Based Parity Lower Bounds with Small Probability Bias
|
|
- Mitchell Higgins
- 5 years ago
- Views:
Transcription
1 Adversary-Based Parity Lower Bounds with Small Probability Bias Badih Ghazi Adversary-Based Parity Lower Bounds with Small Probability Bias 1 / 10
2 Setup Computing the parity function in the query model with error probability 1/2 q(n) where q(n) = o(1). Adversary-Based Parity Lower Bounds with Small Probability Bias 2 / 10
3 Setup Computing the parity function in the query model with error probability 1/2 q(n) where q(n) = o(1). Using the polynomial method: Ω(n) for any q(n) 0. Adversary-Based Parity Lower Bounds with Small Probability Bias 2 / 10
4 Setup Computing the parity function in the query model with error probability 1/2 q(n) where q(n) = o(1). Using the polynomial method: Ω(n) for any q(n) 0. Additive adversary arguments: Adversary-Based Parity Lower Bounds with Small Probability Bias 2 / 10
5 Setup Computing the parity function in the query model with error probability 1/2 q(n) where q(n) = o(1). Using the polynomial method: Ω(n) for any q(n) 0. Additive adversary arguments: Reichardt s characterization of Q(f ) in terms of Adv ± (f ) holds only in the bounded error case. Q 1/2 q(n) (Parity n ) Adv ± 1/2 q(n) (Parity n) = Ω((q(n)) 2 n) Adversary-Based Parity Lower Bounds with Small Probability Bias 2 / 10
6 Setup Computing the parity function in the query model with error probability 1/2 q(n) where q(n) = o(1). Using the polynomial method: Ω(n) for any q(n) 0. Additive adversary arguments: Reichardt s characterization of Q(f ) in terms of Adv ± (f ) holds only in the bounded error case. Q 1/2 q(n) (Parity n ) Adv ± 1/2 q(n) (Parity n) = Ω((q(n)) 2 n) Decays rapidly with q(n). Adversary-Based Parity Lower Bounds with Small Probability Bias 2 / 10
7 Setup Computing the parity function in the query model with error probability 1/2 q(n) where q(n) = o(1). Using the polynomial method: Ω(n) for any q(n) 0. Additive adversary arguments: Reichardt s characterization of Q(f ) in terms of Adv ± (f ) holds only in the bounded error case. Q 1/2 q(n) (Parity n ) Adv ± 1/2 q(n) (Parity n) = Ω((q(n)) 2 n) Decays rapidly with q(n). Gives a trivial constant bound even for q(n) = 1/ n. Adversary-Based Parity Lower Bounds with Small Probability Bias 2 / 10
8 Setup Computing the parity function in the query model with error probability 1/2 q(n) where q(n) = o(1). Using the polynomial method: Ω(n) for any q(n) 0. Additive adversary arguments: Reichardt s characterization of Q(f ) in terms of Adv ± (f ) holds only in the bounded error case. Q 1/2 q(n) (Parity n ) Adv ± 1/2 q(n) (Parity n) = Ω((q(n)) 2 n) Decays rapidly with q(n). Gives a trivial constant bound even for q(n) = 1/ n. Question: Can we get a better lower bound using adversary-based arguments? Adversary-Based Parity Lower Bounds with Small Probability Bias 2 / 10
9 Outline Adversary-Based Parity Lower Bounds with Small Probability Bias 3 / 10
10 Outline Show a lower bound of Ω(n) even for exponentially small q(n). Adversary-Based Parity Lower Bounds with Small Probability Bias 3 / 10
11 Outline Show a lower bound of Ω(n) even for exponentially small q(n). Proof is based on a quantum reduction to the t-fold search problem, with t = θ(n). Adversary-Based Parity Lower Bounds with Small Probability Bias 3 / 10
12 Outline Show a lower bound of Ω(n) even for exponentially small q(n). Proof is based on a quantum reduction to the t-fold search problem, with t = θ(n). Adaptation of the proof of Cleve et. al to our setup. Adversary-Based Parity Lower Bounds with Small Probability Bias 3 / 10
13 Outline Show a lower bound of Ω(n) even for exponentially small q(n). Proof is based on a quantum reduction to the t-fold search problem, with t = θ(n). Adaptation of the proof of Cleve et. al to our setup. Holds even for weak algorithms for parity. Adversary-Based Parity Lower Bounds with Small Probability Bias 3 / 10
14 The quantum reduction Notation For any S [n], χ S : Characteristic vector of S x S : Restriction of x to the subset S. Adversary-Based Parity Lower Bounds with Small Probability Bias 4 / 10
15 The quantum reduction Notation For any S [n], χ S : Characteristic vector of S x S : Restriction of x to the subset S. Observation [Scott Aaronson]: for all x {0, 1} n, we have 1 2 n ( 1) Parn(x S) H n χ S = x S [n] Adversary-Based Parity Lower Bounds with Small Probability Bias 4 / 10
16 The quantum reduction Notation For any S [n], χ S : Characteristic vector of S x S : Restriction of x to the subset S. Observation [Scott Aaronson]: for all x {0, 1} n, we have 1 2 n ( 1) Parn(x S) H n χ S = x S [n] Given an algorithm that produces such a superposition with r(n) queries, get an algorithm that recovers x with r(n) queries. Adversary-Based Parity Lower Bounds with Small Probability Bias 4 / 10
17 The quantum reduction Notation For any S [n], χ S : Characteristic vector of S x S : Restriction of x to the subset S. Observation [Scott Aaronson]: for all x {0, 1} n, we have 1 2 n ( 1) Parn(x S) H n χ S = x S [n] Given an algorithm that produces such a superposition with r(n) queries, get an algorithm that recovers x with r(n) queries. Need to deal with garbage. Adversary-Based Parity Lower Bounds with Small Probability Bias 4 / 10
18 The quantum reduction for coherent algorithms A parity algorithm is coherent if on inputs x and S, it takes the state x χ S z to x χ S z + Par n (x S ). Adversary-Based Parity Lower Bounds with Small Probability Bias 5 / 10
19 The quantum reduction for coherent algorithms A parity algorithm is coherent if on inputs x and S, it takes the state x χ S z to x χ S z + Par n (x S ). The reduction Start with the state x 0 n 1. Adversary-Based Parity Lower Bounds with Small Probability Bias 5 / 10
20 The quantum reduction for coherent algorithms A parity algorithm is coherent if on inputs x and S, it takes the state x χ S z to x χ S z + Par n (x S ). The reduction Start with the state x 0 n 1. Hadamard the last n + 1 qubits: 1 2 n+1 (z,χ S ) {0,1} n+1 ( 1) z x χ S z Adversary-Based Parity Lower Bounds with Small Probability Bias 5 / 10
21 The quantum reduction for coherent algorithms A parity algorithm is coherent if on inputs x and S, it takes the state x χ S z to x χ S z + Par n (x S ). The reduction Start with the state x 0 n 1. Hadamard the last n + 1 qubits: 1 2 n+1 (z,χ S ) {0,1} n+1 ( 1) z x χ S z Apply the coherent parity algorithm and Hadamard the last (n + 1) qubits: 1 2 n+1 (z,χ S ) {0,1} n+1 ( 1) z+parn(x S) x H n χ S H 1 z = x x 1 Adversary-Based Parity Lower Bounds with Small Probability Bias 5 / 10
22 The quantum reduction for coherent algorithms A parity algorithm is coherent if on inputs x and S, it takes the state x χ S z to x χ S z + Par n (x S ). The reduction Start with the state x 0 n 1. Hadamard the last n + 1 qubits: 1 2 n+1 (z,χ S ) {0,1} n+1 ( 1) z x χ S z Apply the coherent parity algorithm and Hadamard the last (n + 1) qubits: 1 2 n+1 (z,χ S ) {0,1} n+1 ( 1) z+parn(x S) x H n χ S H 1 z = x x 1 Measure the middle n qubits in the standard basis: get x with probability 1! Adversary-Based Parity Lower Bounds with Small Probability Bias 5 / 10
23 The quantum reduction for coherent algorithms Claim Let ΣO be any finite set. If there exists a coherent algorithm A that computes Parityn using r(n) queries, then for any function f : {0, 1} n Σ O, there is an algorithm B f that computes f exactly using r(n) queries. Adversary-Based Parity Lower Bounds with Small Probability Bias 6 / 10
24 The quantum reduction for general algorithms Claim Let t n 4e, t = θ(n). Let q(n) = Ω(e t/16 ) If A computes Parity n with error probability p x (n) for every x {0, 1} n and for all x with x = t, 1 2 n p x S (n) 1/2 q(n) S {0,1} n Then, A makes Ω(n) queries. Adversary-Based Parity Lower Bounds with Small Probability Bias 7 / 10
25 The quantum reduction for general algorithms Claim Let t n 4e, t = θ(n). Let q(n) = Ω(e t/16 ) If A computes Parity n with error probability p x (n) for every x {0, 1} n and for all x with x = t, Then, A makes Ω(n) queries. Corollary 1 2 n p x S (n) 1/2 q(n) S {0,1} n Q 1 2 e c n(parity n) = Ω(n) for any constant c Adversary-Based Parity Lower Bounds with Small Probability Bias 7 / 10
26 General parity algorithms A takes the state x χ S z 0 0 w to a x,s x χ S z Par n (x S ) J x,s + b x,s x χ S z Par n(x S ) K x,s where b x,s 2 = p x S (n), a x,s 2 + b x,s 2 = 1 and J x,s and K x,s are unit vectors. Adversary-Based Parity Lower Bounds with Small Probability Bias 8 / 10
27 General parity algorithms A takes the state x χ S z 0 0 w to a x,s x χ S z Par n (x S ) J x,s + b x,s x χ S z Par n(x S ) K x,s where b x,s 2 = p x S (n), a x,s 2 + b x,s 2 = 1 and J x,s and K x,s are unit vectors. Apply a CNOT gate and uncompute A: x χ S z + Par n (x S ) 0 (w+1) + 2b x,s M x,s,z where M x,s,z satisfies the properties M x,s,0 = M x,s,1 and { M x,s,0 } x,s is orthonormal. Adversary-Based Parity Lower Bounds with Small Probability Bias 8 / 10
28 General parity algorithms A takes the state x χ S z 0 0 w to a x,s x χ S z Par n (x S ) J x,s + b x,s x χ S z Par n(x S ) K x,s where b x,s 2 = p x S (n), a x,s 2 + b x,s 2 = 1 and J x,s and K x,s are unit vectors. Apply a CNOT gate and uncompute A: x χ S z + Par n (x S ) 0 (w+1) + 2b x,s M x,s,z where M x,s,z satisfies the properties M x,s,0 = M x,s,1 and { M x,s,0 } x,s is orthonormal. x χ S z + Par n (x S ) 0 (w+1) : Output of a coherent parity algorithm Not necessarily orthogonal to Mx,S,z Adversary-Based Parity Lower Bounds with Small Probability Bias 8 / 10
29 The quantum reduction for general algorithms Apply Hadamard gate, the above algorithm and another Hadamard gate: x x 1 0 (w+1) + ψ ψ 2 2 = 1 ( 1) z b 2 n x,s M x,s,z 2 2 (z,χ S ) {0,1} n+1 = 4 2 n p x S (n) χ S {0,1} n Adversary-Based Parity Lower Bounds with Small Probability Bias 9 / 10
30 The quantum reduction for general algorithms Apply Hadamard gate, the above algorithm and another Hadamard gate: x x 1 0 (w+1) + ψ ψ 2 2 = 1 ( 1) z b 2 n x,s M x,s,z 2 2 (z,χ S ) {0,1} n+1 = 4 2 n p x S (n) χ S {0,1} n Pr[Obtaining x] 4q 2 (n) whenever 1 2 n p x S (n) ( 1 2 q(n)) S {0,1} n Adversary-Based Parity Lower Bounds with Small Probability Bias 9 / 10
31 The quantum reduction for general algorithms Holevo s theorem? Adversary-Based Parity Lower Bounds with Small Probability Bias 10 / 10
32 The quantum reduction for general algorithms Holevo s theorem? n queries to the oracle might give n log n classical bits of information. Adversary-Based Parity Lower Bounds with Small Probability Bias 10 / 10
33 The quantum reduction for general algorithms Holevo s theorem? n queries to the oracle might give n log n classical bits of information. The t-fold search problem Given x {0, 1} n and promised that x = t, find the subset J [n] of 1 s of x. Adversary-Based Parity Lower Bounds with Small Probability Bias 10 / 10
34 The quantum reduction for general algorithms Holevo s theorem? n queries to the oracle might give n log n classical bits of information. The t-fold search problem Given x {0, 1} n and promised that x = t, find the subset J [n] of 1 s of x. For every t n 4e and every ɛ = 1 Ω(e t/8 ), Q ɛ (t-fold search) = Ω( tn). Proof using the earliest version of the multiplicative adversary method(ambianis 2005, Spalek 2007) Adversary-Based Parity Lower Bounds with Small Probability Bias 10 / 10
35 The quantum reduction for general algorithms Holevo s theorem? n queries to the oracle might give n log n classical bits of information. The t-fold search problem Given x {0, 1} n and promised that x = t, find the subset J [n] of 1 s of x. For every t n 4e and every ɛ = 1 Ω(e t/8 ), Q ɛ (t-fold search) = Ω( tn). Proof using the earliest version of the multiplicative adversary method(ambianis 2005, Spalek 2007) Conclude: The claim holds for all q(n) = Ω(e t/16 ). Adversary-Based Parity Lower Bounds with Small Probability Bias 10 / 10
Adversary-Based Parity Lower Bounds with Small Probability Bias
Adversary-Based Parity Lower Bounds with Small Probability Bias Badih Ghazi badih@mit.edu Introduction The quantum query complexity of the parity function on n variables is known to be exactly n/2, for
More informationLecture 13: Lower Bounds using the Adversary Method. 2 The Super-Basic Adversary Method [Amb02]
Quantum Computation (CMU 18-859BB, Fall 015) Lecture 13: Lower Bounds using the Adversary Method October 1, 015 Lecturer: Ryan O Donnell Scribe: Kumail Jaffer 1 Introduction There are a number of known
More informationFrom Adversaries to Algorithms. Troy Lee Rutgers University
From Adversaries to Algorithms Troy Lee Rutgers University Quantum Query Complexity As in classical complexity, it is difficult to show lower bounds on the time or number of gates required to solve a problem
More informationQuantum algorithms (CO 781/CS 867/QIC 823, Winter 2013) Andrew Childs, University of Waterloo LECTURE 13: Query complexity and the polynomial method
Quantum algorithms (CO 781/CS 867/QIC 823, Winter 2013) Andrew Childs, University of Waterloo LECTURE 13: Query complexity and the polynomial method So far, we have discussed several different kinds of
More informationSimulation of quantum computers with probabilistic models
Simulation of quantum computers with probabilistic models Vlad Gheorghiu Department of Physics Carnegie Mellon University Pittsburgh, PA 15213, U.S.A. April 6, 2010 Vlad Gheorghiu (CMU) Simulation of quantum
More informationFourier Sampling & Simon s Algorithm
Chapter 4 Fourier Sampling & Simon s Algorithm 4.1 Reversible Computation A quantum circuit acting on n qubits is described by an n n unitary operator U. Since U is unitary, UU = U U = I. This implies
More informationIntroduction to Quantum Algorithms Part I: Quantum Gates and Simon s Algorithm
Part I: Quantum Gates and Simon s Algorithm Martin Rötteler NEC Laboratories America, Inc. 4 Independence Way, Suite 00 Princeton, NJ 08540, U.S.A. International Summer School on Quantum Information, Max-Planck-Institut
More informationQuantum algorithms based on span programs
Quantum algorithms based on span programs Ben Reichardt IQC, U Waterloo [arxiv:0904.2759] Model: Complexity measure: Quantum algorithms Black-box query complexity Span programs Witness size [KW 93] [RŠ
More informationQuantum Searching. Robert-Jan Slager and Thomas Beuman. 24 november 2009
Quantum Searching Robert-Jan Slager and Thomas Beuman 24 november 2009 1 Introduction Quantum computers promise a significant speed-up over classical computers, since calculations can be done simultaneously.
More informationIntroduction to Quantum Computing
Introduction to Quantum Computing Petros Wallden Lecture 7: Complexity & Algorithms I 13th October 016 School of Informatics, University of Edinburgh Complexity - Computational Complexity: Classification
More informationIntroduction to Quantum Computing
Introduction to Quantum Computing Part II Emma Strubell http://cs.umaine.edu/~ema/quantum_tutorial.pdf April 13, 2011 Overview Outline Grover s Algorithm Quantum search A worked example Simon s algorithm
More informationTime-Efficient Quantum Walks for 3-Distinctness
Time-Efficient Quantum Walks for 3-Distinctness Aleksandrs Belovs 1, Andrew M. Childs 2,4, Stacey Jeffery 3,4, Robin Kothari 3,4, and Frédéric Magniez 5 1 Faculty of Computing, University of Latvia 2 Department
More information6.896 Quantum Complexity Theory Oct. 28, Lecture 16
6.896 Quantum Complexity Theory Oct. 28, 2008 Lecturer: Scott Aaronson Lecture 16 1 Recap Last time we introduced the complexity class QMA (quantum Merlin-Arthur), which is a quantum version for NP. In
More informationIntroduction to Quantum Information Processing
Introduction to Quantum Information Processing Lecture 6 Richard Cleve Overview of Lecture 6 Continuation of teleportation Computation and some basic complexity classes Simple quantum algorithms in the
More informationQUANTUM COMPUTATION. Exercise sheet 1. Ashley Montanaro, University of Bristol H Z U = 1 2
School of Mathematics Spring 017 QUANTUM COMPUTATION Exercise sheet 1 Ashley Montanaro, University of Bristol ashley.montanaro@bristol.ac.uk 1. The quantum circuit model. (a) Consider the following quantum
More informationQuantum Query Complexity of Boolean Functions with Small On-Sets
Quantum Query Complexity of Boolean Functions with Small On-Sets Seiichiro Tani TT/JST ERATO-SORST. Joint work with Andris Ambainis Univ. of Latvia Kazuo Iwama Kyoto Univ. Masaki akanishi AIST. Harumichi
More informationCompute the Fourier transform on the first register to get x {0,1} n x 0.
CS 94 Recursive Fourier Sampling, Simon s Algorithm /5/009 Spring 009 Lecture 3 1 Review Recall that we can write any classical circuit x f(x) as a reversible circuit R f. We can view R f as a unitary
More informationLecture 21: Quantum communication complexity
CPSC 519/619: Quantum Computation John Watrous, University of Calgary Lecture 21: Quantum communication complexity April 6, 2006 In this lecture we will discuss how quantum information can allow for a
More informationQuantum Lower Bound for Recursive Fourier Sampling
Quantum Lower Bound for Recursive Fourier Sampling Scott Aaronson Institute for Advanced Study, Princeton aaronson@ias.edu Abstract One of the earliest quantum algorithms was discovered by Bernstein and
More informationSingle qubit + CNOT gates
Lecture 6 Universal quantum gates Single qubit + CNOT gates Single qubit and CNOT gates together can be used to implement an arbitrary twolevel unitary operation on the state space of n qubits. Suppose
More informationUncloneable Quantum Money
1 Institute for Quantum Computing University of Waterloo Joint work with Michele Mosca CQISC 2006 1 Supported by NSERC, Sun Microsystems, CIAR, CFI, CSE, MITACS, ORDCF. Outline Introduction Requirements
More informationThe Quantum Query Complexity of Algebraic Properties
The Quantum Query Complexity of Algebraic Properties Sebastian Dörn Institut für Theoretische Informatik Universität Ulm 89069 Ulm, Germany Thomas Thierauf Fak. Elektronik und Informatik HTW Aalen 73430
More informationQuantum information and quantum computing
Middle East Technical University, Department of Physics January 7, 009 Outline Measurement 1 Measurement 3 Single qubit gates Multiple qubit gates 4 Distinguishability 5 What s measurement? Quantum measurement
More informationAn Introduction to Quantum Information and Applications
An Introduction to Quantum Information and Applications Iordanis Kerenidis CNRS LIAFA-Univ Paris-Diderot Quantum information and computation Quantum information and computation How is information encoded
More informationPh 219b/CS 219b. Exercises Due: Wednesday 4 December 2013
1 Ph 219b/CS 219b Exercises Due: Wednesday 4 December 2013 4.1 The peak in the Fourier transform In the period finding algorithm we prepared the periodic state A 1 1 x 0 + jr, (1) A j=0 where A is the
More informationAdvanced Cryptography Quantum Algorithms Christophe Petit
The threat of quantum computers Advanced Cryptography Quantum Algorithms Christophe Petit University of Oxford Christophe Petit -Advanced Cryptography 1 Christophe Petit -Advanced Cryptography 2 The threat
More informationb) (5 points) Give a simple quantum circuit that transforms the state
C/CS/Phy191 Midterm Quiz Solutions October 0, 009 1 (5 points) Short answer questions: a) (5 points) Let f be a function from n bits to 1 bit You have a quantum circuit U f for computing f If you wish
More informationRichard Cleve David R. Cheriton School of Computer Science Institute for Quantum Computing University of Waterloo
CS 497 Frontiers of Computer Science Introduction to Quantum Computing Lecture of http://www.cs.uwaterloo.ca/~cleve/cs497-f7 Richard Cleve David R. Cheriton School of Computer Science Institute for Quantum
More information6.896 Quantum Complexity Theory November 4th, Lecture 18
6.896 Quantum Complexity Theory November 4th, 2008 Lecturer: Scott Aaronson Lecture 18 1 Last Time: Quantum Interactive Proofs 1.1 IP = PSPACE QIP = QIP(3) EXP The first result is interesting, because
More informationQuantum Computing Lecture 6. Quantum Search
Quantum Computing Lecture 6 Quantum Search Maris Ozols Grover s search problem One of the two most important algorithms in quantum computing is Grover s search algorithm (invented by Lov Grover in 1996)
More informationExtended Superposed Quantum State Initialization Using Disjoint Prime Implicants
Extended Superposed Quantum State Initialization Using Disjoint Prime Implicants David Rosenbaum, Marek Perkowski Portland State University, Department of Computer Science Portland State University, Department
More informationQuantum algorithms (CO 781, Winter 2008) Prof. Andrew Childs, University of Waterloo LECTURE 1: Quantum circuits and the abelian QFT
Quantum algorithms (CO 78, Winter 008) Prof. Andrew Childs, University of Waterloo LECTURE : Quantum circuits and the abelian QFT This is a course on quantum algorithms. It is intended for graduate students
More informationAn Introduction to Quantum Computation and Quantum Information
An to and Graduate Group in Applied Math University of California, Davis March 13, 009 A bit of history Benioff 198 : First paper published mentioning quantum computing Feynman 198 : Use a quantum computer
More informationThe Polynomial Method Strikes Back: Tight Quantum Query Bounds Via Dual Polynomials
The Polynomial Method Strikes Back: Tight Quantum Query Bounds Via Dual Polynomials Justin Thaler (Georgetown) Joint work with: Mark Bun (Princeton) Robin Kothari (MSR Redmond) Boolean Functions Boolean
More informationChapter 10. Quantum algorithms
Chapter 10. Quantum algorithms Complex numbers: a quick review Definition: C = { a + b i : a, b R } where i = 1. Polar form of z = a + b i is z = re iθ, where r = z = a 2 + b 2 and θ = tan 1 y x Alternatively,
More informationLecture 9: Phase Estimation
CS 880: Quantum Information Processing 9/3/010 Lecture 9: Phase Estimation Instructor: Dieter van Melkebeek Scribe: Hesam Dashti Last lecture we reviewed the classical setting of the Fourier Transform
More information. An introduction to Quantum Complexity. Peli Teloni
An introduction to Quantum Complexity Peli Teloni Advanced Topics on Algorithms and Complexity µπλ July 3, 2014 1 / 50 Outline 1 Motivation 2 Computational Model Quantum Circuits Quantum Turing Machine
More informationChebyshev Polynomials, Approximate Degree, and Their Applications
Chebyshev Polynomials, Approximate Degree, and Their Applications Justin Thaler 1 Georgetown University Boolean Functions Boolean function f : { 1, 1} n { 1, 1} AND n (x) = { 1 (TRUE) if x = ( 1) n 1 (FALSE)
More information6.896 Quantum Complexity Theory October 2, Lecture 9
6896 Quantum Complexity heory October, 008 Lecturer: Scott Aaronson Lecture 9 In this class we discuss Grover s search algorithm as well as the BBBV proof that it is optimal 1 Grover s Algorithm 11 Setup
More informationSimulating classical circuits with quantum circuits. The complexity class Reversible-P. Universal gate set for reversible circuits P = Reversible-P
Quantum Circuits Based on notes by John Watrous and also Sco8 Aaronson: www.sco8aaronson.com/democritus/ John Preskill: www.theory.caltech.edu/people/preskill/ph229 Outline Simulating classical circuits
More informationQuantum Algorithms for Finding Constant-sized Sub-hypergraphs
Quantum Algorithms for Finding Constant-sized Sub-hypergraphs Seiichiro Tani (Joint work with François Le Gall and Harumichi Nishimura) NTT Communication Science Labs., NTT Corporation, Japan. The 20th
More information1 Bernstein-Vazirani Algorithm
CMSC 33001: Novel Computing Architectures and Technologies Lecturer: Yongshan Ding, Pranav Gokhale Scribe: Shankar G. Menon Lecture 08: More on Algorithms November 1, 018 1 Bernstein-Vazirani Algorithm
More informationThe quantum query complexity of read-many formulas
The quantum query complexity of read-many formulas Andrew Childs Waterloo Shelby Kimmel MIT Robin Kothari Waterloo Boolean formulas ^ x 1 x 2 _ x 3 ^ x 1 x 3 A formula is read-once if every input appears
More information6. Quantum error correcting codes
6. Quantum error correcting codes Error correcting codes (A classical repetition code) Preserving the superposition Parity check Phase errors CSS 7-qubit code (Steane code) Too many error patterns? Syndrome
More informationLecture 3: Hilbert spaces, tensor products
CS903: Quantum computation and Information theory (Special Topics In TCS) Lecture 3: Hilbert spaces, tensor products This lecture will formalize many of the notions introduced informally in the second
More informationComplex numbers: a quick review. Chapter 10. Quantum algorithms. Definition: where i = 1. Polar form of z = a + b i is z = re iθ, where
Chapter 0 Quantum algorithms Complex numbers: a quick review / 4 / 4 Definition: C = { a + b i : a, b R } where i = Polar form of z = a + b i is z = re iθ, where r = z = a + b and θ = tan y x Alternatively,
More informationImproved Quantum Algorithm for Triangle Finding via Combinatorial Arguments
Improved Quantum Algorithm for Triangle Finding via Combinatorial Arguments François Le Gall The University of Tokyo Technical version available at arxiv:1407.0085 [quant-ph]. Background. Triangle finding
More informationLecture 2: From Classical to Quantum Model of Computation
CS 880: Quantum Information Processing 9/7/10 Lecture : From Classical to Quantum Model of Computation Instructor: Dieter van Melkebeek Scribe: Tyson Williams Last class we introduced two models for deterministic
More informationQuantum Communication
Quantum Communication Harry Buhrman CWI & University of Amsterdam Physics and Computing Computing is physical Miniaturization quantum effects Quantum Computers ) Enables continuing miniaturization ) Fundamentally
More informationLecture 4: Elementary Quantum Algorithms
CS 880: Quantum Information Processing 9/13/010 Lecture 4: Elementary Quantum Algorithms Instructor: Dieter van Melkebeek Scribe: Kenneth Rudinger This lecture introduces several simple quantum algorithms.
More informationQuantum Computing: Foundations to Frontier Fall Lecture 3
Quantum Computing: Foundations to Frontier Fall 018 Lecturer: Henry Yuen Lecture 3 Scribes: Seyed Sajjad Nezhadi, Angad Kalra Nora Hahn, David Wandler 1 Overview In Lecture 3, we started off talking about
More informationOptimal Hamiltonian Simulation by Quantum Signal Processing
Optimal Hamiltonian Simulation by Quantum Signal Processing Guang-Hao Low, Isaac L. Chuang Massachusetts Institute of Technology QIP 2017 January 19 1 Physics Computation Physical concepts inspire problem-solving
More informationIntroduction to Quantum Information Processing QIC 710 / CS 768 / PH 767 / CO 681 / AM 871
Introduction to Quantum Information Processing QIC 710 / CS 768 / PH 767 / CO 681 / AM 871 Lecture 1 (2017) Jon Yard QNC 3126 jyard@uwaterloo.ca TAs Nitica Sakharwade nsakharwade@perimeterinstitute.ca
More informationLecture 4: LMN Learning (Part 2)
CS 294-114 Fine-Grained Compleity and Algorithms Sept 8, 2015 Lecture 4: LMN Learning (Part 2) Instructor: Russell Impagliazzo Scribe: Preetum Nakkiran 1 Overview Continuing from last lecture, we will
More informationReflections Reflections
Reflections Reflections for quantum query algorithms Ben Reichardt University of Waterloo Reflections Reflections for quantum query algorithms Ben Reichardt University of Waterloo Reflections for quantum
More informationPrinciples of Quantum Mechanics Pt. 2
Principles of Quantum Mechanics Pt. 2 PHYS 500 - Southern Illinois University February 9, 2017 PHYS 500 - Southern Illinois University Principles of Quantum Mechanics Pt. 2 February 9, 2017 1 / 13 The
More informationC/CS/Phys C191 Grover s Quantum Search Algorithm 11/06/07 Fall 2007 Lecture 21
C/CS/Phys C191 Grover s Quantum Search Algorithm 11/06/07 Fall 2007 Lecture 21 1 Readings Benenti et al, Ch 310 Stolze and Suter, Quantum Computing, Ch 84 ielsen and Chuang, Quantum Computation and Quantum
More informationα x x 0 α x x f(x) α x x α x ( 1) f(x) x f(x) x f(x) α x = α x x 2
Quadratic speedup for unstructured search - Grover s Al- CS 94- gorithm /8/07 Spring 007 Lecture 11 01 Unstructured Search Here s the problem: You are given an efficient boolean function f : {1,,} {0,1},
More informationQuantum Communication Complexity
Quantum Communication Complexity Ronald de Wolf Communication complexity has been studied extensively in the area of theoretical computer science and has deep connections with seemingly unrelated areas,
More information. Here we are using the standard inner-product over C k to define orthogonality. Recall that the inner-product of two vectors φ = i α i.
CS 94- Hilbert Spaces, Tensor Products, Quantum Gates, Bell States 1//07 Spring 007 Lecture 01 Hilbert Spaces Consider a discrete quantum system that has k distinguishable states (eg k distinct energy
More informationIntroduction into Quantum Computations Alexei Ashikhmin Bell Labs
Introduction into Quantum Computations Alexei Ashikhmin Bell Labs Workshop on Quantum Computing and its Application March 16, 2017 Qubits Unitary transformations Quantum Circuits Quantum Measurements Quantum
More information6.896 Quantum Complexity Theory November 11, Lecture 20
6.896 Quantum Complexity Theory November, 2008 Lecturer: Scott Aaronson Lecture 20 Last Time In the previous lecture, we saw the result of Aaronson and Watrous that showed that in the presence of closed
More informationShort introduction to Quantum Computing
November 7, 2017 Short introduction to Quantum Computing Joris Kattemölle QuSoft, CWI, Science Park 123, Amsterdam, The Netherlands Institute for Theoretical Physics, University of Amsterdam, Science Park
More informationQuantum Computation. Michael A. Nielsen. University of Queensland
Quantum Computation Michael A. Nielsen University of Queensland Goals: 1. To eplain the quantum circuit model of computation. 2. To eplain Deutsch s algorithm. 3. To eplain an alternate model of quantum
More informationPh 219b/CS 219b. Exercises Due: Wednesday 22 February 2006
1 Ph 219b/CS 219b Exercises Due: Wednesday 22 February 2006 6.1 Estimating the trace of a unitary matrix Recall that using an oracle that applies the conditional unitary Λ(U), Λ(U): 0 ψ 0 ψ, 1 ψ 1 U ψ
More informationSTRONG DIRECT PRODUCT THEOREMS FOR QUANTUM COMMUNICATION AND QUERY COMPLEXITY
STRONG DIRECT PRODUCT THEOREMS FOR QUANTUM COMMUNICATION AND QUERY COMPLEXITY ALEXANDER A. SHERSTOV Abstract. A strong direct product theorem SDPT) states that solving n instances of a problem requires
More informationQuantum Algorithms Lecture #2. Stephen Jordan
Quantum Algorithms Lecture #2 Stephen Jordan Last Time Defined quantum circuit model. Argued it captures all of quantum computation. Developed some building blocks: Gate universality Controlled-unitaries
More informationarxiv: v3 [quant-ph] 18 Nov 2008
Span-program-based quantum algorithm for evaluating formulas Ben W. Reichardt Robert Špalek arxiv:0710.2630v3 [quant-ph] 18 Nov 2008 Abstract We give a quantum algorithm for evaluating formulas over an
More informationOn the query complexity of counterfeiting quantum money
On the query complexity of counterfeiting quantum money Andrew Lutomirski December 14, 2010 Abstract Quantum money is a quantum cryptographic protocol in which a mint can produce a state (called a quantum
More informationQuantum algorithms. Andrew Childs. Institute for Quantum Computing University of Waterloo
Quantum algorithms Andrew Childs Institute for Quantum Computing University of Waterloo 11th Canadian Summer School on Quantum Information 8 9 June 2011 Based in part on slides prepared with Pawel Wocjan
More informationBounds for Error Reduction with Few Quantum Queries
Bounds for Error Reduction with Few Quantum Queries Sourav Chakraborty, Jaikumar Radhakrishnan 2,3, and andakumar Raghunathan Department of Computer Science, University of Chicago, Chicago, IL 60637, USA
More informationTHE RANK METHOD AND APPLICATIONS TO POST- QUANTUM CRYPTOGRAPHY
THE RANK METHOD AND APPLICATIONS TO POST- QUANTUM CRYPTOGRAPHY Mark Zhandry - Stanford University Joint work with Dan Boneh Classical Cryptography Post-Quantum Cryptography All communication stays classical
More informationLecture 7: Quantum Fourier Transform over Z N
Quantum Computation (CMU 18-859BB, Fall 015) Lecture 7: Quantum Fourier Transform over Z September 30, 015 Lecturer: Ryan O Donnell Scribe: Chris Jones 1 Overview Last time, we talked about two main topics:
More informationGrover s algorithm. We want to find aa. Search in an unordered database. QC oracle (as usual) Usual trick
Grover s algorithm Search in an unordered database Example: phonebook, need to find a person from a phone number Actually, something else, like hard (e.g., NP-complete) problem 0, xx aa Black box ff xx
More information6.896 Quantum Complexity Theory September 18, Lecture 5
6.896 Quantum Complexity Theory September 18, 008 Lecturer: Scott Aaronson Lecture 5 Last time we looked at what s known about quantum computation as it relates to classical complexity classes. Today we
More informationThe Quantum Query Complexity of the Determinant
The Quantum Query Complexity of the Determinant Sebastian Dörn Inst. für Theoretische Informatik Universität Ulm 89069 Ulm, Germany Thomas Thierauf Fak. Elektronik und Informatik HTW Aalen 73430 Aalen,
More informationCS257 Discrete Quantum Computation
CS57 Discrete Quantum Computation John E Savage April 30, 007 Lect 11 Quantum Computing c John E Savage Classical Computation State is a vector of reals; e.g. Booleans, positions, velocities, or momenta.
More informationLimitations on transversal gates
Limitations on transversal gates Michael Newman 1 and Yaoyun Shi 1,2 University of Michigan 1, Alibaba Group 2 February 6, 2018 Quantum fault-tolerance Quantum fault-tolerance Quantum fault-tolerance Quantum
More informationOn The Complexity of Quantum Circuit Manipulation
On The Complexity of Quantum Circuit Manipulation Vincent Liew 1 Introduction The stabilizer class of circuits, introduced by Daniel Gottesman, consists of quantum circuits in which every gate is a controlled-not
More informationExponential Quantum Speed-ups are Generic
Exponential Quantum Speed-ups are Generic Fernando GSL Brandão 1 and Michał Horodecki 2 1 Universidade Federal de Minas Gerais, Brazil 2 University of Gdansk, Poland The Role of Fourier Transform in Quantum
More informationOn the tightness of the Buhrman-Cleve-Wigderson simulation
On the tightness of the Buhrman-Cleve-Wigderson simulation Shengyu Zhang Department of Computer Science and Engineering, The Chinese University of Hong Kong. syzhang@cse.cuhk.edu.hk Abstract. Buhrman,
More informationarxiv: v3 [quant-ph] 3 Jul 2012
MIT-CTP 4242 Super-Polynomial Quantum Speed-ups for Boolean Evaluation Trees with Hidden Structure Bohua Zhan Shelby Kimmel Avinatan Hassidim November 2, 2018 arxiv:1101.0796v3 [quant-ph] 3 Jul 2012 Abstract
More informationSeminar 1. Introduction to Quantum Computing
Seminar 1 Introduction to Quantum Computing Before going in I am also a beginner in this field If you are interested, you can search more using: Quantum Computing since Democritus (Scott Aaronson) Quantum
More informationQuantum Random Access Memory
Quantum Random Access Memory Carsten Neumann 26.07.2018 What is a Random Access Memory? A Random Access Memory (RAM) is used to store information in an array of memory cells. Each of these cells can be
More informationarxiv: v1 [quant-ph] 9 Jul 2009
Span-program-based quantum algorithm for evaluating unbalanced formulas Ben W. Reichardt arxiv:0907.622v [quant-ph] 9 Jul 2009 Abstract The formula-evaluation problem is defined recursively. A formula
More informationPh 219b/CS 219b. Exercises Due: Wednesday 20 November 2013
1 h 219b/CS 219b Exercises Due: Wednesday 20 November 2013 3.1 Universal quantum gates I In this exercise and the two that follow, we will establish that several simple sets of gates are universal for
More information92 CHAPTER III. QUANTUM COMPUTATION. Figure III.11: Diagram for swap (from NC).
92 CHAPTER III. QUANTUM COMPUTATION Figure III.11: Diagram for swap (from NC). C.3 Quantum circuits 1. Quantum circuit: A quantum circuit isa sequential seriesofquantum transformations on a quantum register.
More informationIntroduction to Quantum Computing
Introduction to Quantum Computing Part I Emma Strubell http://cs.umaine.edu/~ema/quantum_tutorial.pdf April 12, 2011 Overview Outline What is quantum computing? Background Caveats Fundamental differences
More informationarxiv:quant-ph/ v1 29 May 2003
Quantum Lower Bounds for Collision and Element Distinctness with Small Range arxiv:quant-ph/0305179v1 29 May 2003 Andris Ambainis Abstract We give a general method for proving quantum lower bounds for
More informationTutorial on Quantum Computing. Vwani P. Roychowdhury. Lecture 1: Introduction
Tutorial on Quantum Computing Vwani P. Roychowdhury Lecture 1: Introduction 1 & ) &! # Fundamentals Qubits A single qubit is a two state system, such as a two level atom we denote two orthogonal states
More informationAsymptotic Analysis. Slides by Carl Kingsford. Jan. 27, AD Chapter 2
Asymptotic Analysis Slides by Carl Kingsford Jan. 27, 2014 AD Chapter 2 Independent Set Definition (Independent Set). Given a graph G = (V, E) an independent set is a set S V if no two nodes in S are joined
More informationLower Bounds on Quantum Query Complexity
Lower Bounds on Quantum Query Complexity Peter Høyer hoyer@cpsc.ucalgary.ca Robert Špalek sr@cwi.nl arxiv:quant-ph/0509153v1 21 Sep 2005 September 2005 Abstract Shor s and Grover s famous quantum algorithms
More informationFourier analysis of boolean functions in quantum computation
Fourier analysis of boolean functions in quantum computation Ashley Montanaro Centre for Quantum Information and Foundations, Department of Applied Mathematics and Theoretical Physics, University of Cambridge
More informationQuantum Information & Quantum Computation
CS90A, Spring 005: Quantum Information & Quantum Computation Wim van Dam Engineering, Room 509 vandam@cs http://www.cs.ucsb.edu/~vandam/teaching/cs90/ Administrative The Final Examination will be: Monday
More informationShor s Prime Factorization Algorithm
Shor s Prime Factorization Algorithm Bay Area Quantum Computing Meetup - 08/17/2017 Harley Patton Outline Why is factorization important? Shor s Algorithm Reduction to Order Finding Order Finding Algorithm
More informationarxiv: v1 [cs.cc] 16 Mar 2017
A Nearly Optimal Lower Bound on the Approximate Degree of AC 0 Mark Bun mbun@cs.princeton.edu Justin Thaler justin.thaler@georgetown.edu arxiv:1703.05784v1 [cs.cc] 16 Mar 2017 Abstract The approximate
More informationLecture 24: Goldreich-Levin Hardcore Predicate. Goldreich-Levin Hardcore Predicate
Lecture 24: : Intuition A One-way Function: A function that is easy to compute but hard to invert (efficiently) Hardcore-Predicate: A secret bit that is hard to compute Theorem (Goldreich-Levin) If f :
More informationOn Quantum Indifferentiability
On Quantum Indifferentiability Tore Vincent Carstens, Ehsan Ebrahimi, Gelo Noel Tabia, and Dominique Unruh University of Tartu, Estonia March 8, 2018 Abstract We study the indifferentiability of classical
More informationLower bounds for Quantum Computation and Communication. Ashwin V. Nayak. B.Tech. (Indian Institute of Technology, Kanpur) 1995
Lower bounds for Quantum Computation and Communication by Ashwin V. Nayak B.Tech. (Indian Institute of Technology, Kanpur) 1995 A dissertation submitted in partial satisfaction of the requirements for
More informationGoldreich-Levin Hardcore Predicate. Lecture 28: List Decoding Hadamard Code and Goldreich-L
Lecture 28: List Decoding Hadamard Code and Goldreich-Levin Hardcore Predicate Recall Let H : {0, 1} n {+1, 1} Let: L ε = {S : χ S agrees with H at (1/2 + ε) fraction of points} Given oracle access to
More information