Quantum Pseudo-Telepathy

Size: px
Start display at page:

Download "Quantum Pseudo-Telepathy"

Transcription

1 Quantum Pseudo-Telepathy Michail Lampis NTUA Quantum Pseudo-Telepathy p.1/24

2 Introduction In Multi-Party computations we are interested in measuring communication complexity. Communication by exchanging quantum bits exponential separation of complexity. Can quantum mechanics be used to completely eliminate communication in an MPC? Can quantum entanglement simulate an arbitrary communication channel? (EPR paradox) Quantum Pseudo-Telepathy p.2/24

3 Overview MPC problem demonstrates Quantum Pseudo-Telepathy It can be performed with 0 bits of communication by quantum players with probability 1. It can be performed with 0 bits of communication by classical players with probability < 1. Quantum Pseudo-Telepathy p.3/24

4 Setting Alice and Bob claim to have telepathic powers. Xavier and Yolande don t believe them Alice and Bob propose a game which will prove their case Alice and Bob must win every single round without communicating Quantum Pseudo-Telepathy p.4/24

5 Example of a game Xavier and Yolande write down a list of animals. Round Xavier Yolande 1 lion giraffe 2 tiger tiger 3 cat mouse At each round Alice and Bob say yes iff they were presented with the same animal. This game does not demonstrate pseudo-telepathy. Quantum Pseudo-Telepathy p.5/24

6 Formal definition of game A game is defined as G = {A, B, X, Y, P, W } A, B, X, Y are sets of possible answers and questions. P X Y is a promise on the questions. W X Y A B is the set of correct answers. Alice and Bob win when asked (x, y) and answer (a, b) if (x, y) / P or (x, y, a, b) W Quantum Pseudo-Telepathy p.6/24

7 Formal definition of pseudo-telepathy Deterministic strategy: functions f : X A, g : Y B Maximum success proportion ω(g) = max f,g {(x, y) P (x, y, f(x), g(y)) W } P Probabilistic strategy: distribution over deterministic strategies Probability of correct answer to (x, y) for strategy s P r s (win (x, y)) Quantum Pseudo-Telepathy p.7/24

8 Formal definition of pseudo-telepathy ( Maximum success probability ω(g) = max s min P r s(win (x, y)) (x,y) P Theorem: ω(g) ω(g) when questions are asked uniformly at random. P 1 When ω(g) P and we have a quantum winning strategy for G we say that G demonstrates Quantum Pseudo-Telepathy. Quantum Pseudo-Telepathy p.8/24

9 Impossible colouring game (i) Kochen-Specker Theorem There exists a finite set of vectors in R 3 which can not be {0, 1} coloured s.t. 1. No two orthogonal vectors are both coloured 1 2. For every three mutually orthogonal vectors at least one is coloured 1 Such a set has the Kochen-Specker property. Quantum Pseudo-Telepathy p.9/24

10 Impossible colouring game (ii) Let V be a set with the Kochen-Specker property. Alice is given a pair of orthogonal v 1, v 2 V or a triple of mutually orthogonal v 1, v 2, v 3 V Bob is given a vector v l V Promise: v l is one of the vectors given to Alice Question: Alice and Bob must {0, 1}-colour their vectors following the Kochen-Specker restrictions. They must give the same colour to v l Quantum Pseudo-Telepathy p.10/24

11 Impossible colouring game (iii) Quantum strategy: Alice and Bob share 4 entangled qbits in state i=0 i i Alice performs a measurement in base { v 1, v 2, v 3 } (if v 3 was not given she uses an arbitrary vector s.t. an orthonormal base is formed). She colours the vector she measured 1. Quantum Pseudo-Telepathy p.11/24

12 Impossible colouring game (iv) Bob performs a measurement in an orthonormal base which contains v l. If he measures v l he colours it 1. Because of entanglement Bob measures v l iff Alice measures v l. Therefore their colourings agree. A deterministic strategy that always wins would produce a proper coulouring of all vectors in V. Therefore ω(g) ω(g) < 1 Quantum Pseudo-Telepathy p.12/24

13 Magic Square game (i) X = Y = {1, 2, 3} A = {000, 011, 101, 110} B = {001, 010, 100, 111} P = X Y, Win: a[y] = b[x] Xavier asks Alice for row x of a magic square. Yolande asks Bob for column y. The answers must agree on their common bit. Quantum Pseudo-Telepathy p.13/24

14 Magic Square game (ii) A successful deterministic strategy would produce a magic square, i.e. a 3 3 square with rows of even parity and columns of odd parity. Hence ω(g) < 1 Quantum strategy: Alice and Bob share four qbits in state ( ). 1 2 They perform a computation depending on x, y and fill in the third bit to have appropriate parity. Quantum Pseudo-Telepathy p.14/24

15 Parity Games (i) Multiplayer games for n 3 players. Each player receives a bit-string x i {0, 1} l Promise: i x i = k2 l Victory: Each player outputs a single bit a i s.t. i a i = k(mod2) For n = 3, l = 1 we have the Mermin-GHZ game Quantum Pseudo-Telepathy p.15/24

16 Parity Games (ii) Quantum strategy: Each player has a bit of the state 1 2 ( 0 n + 1 n ). Each player performs computation e πix i/2 l 1 Each player applies Hadamard gate ( ) ( 0 1 ) Quantum Pseudo-Telepathy p.16/24

17 Parity Games (iii) Step 1 brings state to 1 2 ( 0 + ( 1) k 1 Step 2 brings state to 1 2 n 1 (a)=k(mod2) a Classical strategy for Mermin-GHZ game: a 0 + b 0 + c 0 0 a 0 + b 1 + c 1 1 a 1 + b 0 + c 1 1 a 1 + b 1 + c 0 1 Quantum Pseudo-Telepathy p.17/24

18 Deutsch-Jozsa Games (i) Alice and Bob are given bit strings x,y. They must answer with a=b iff x=y To prevent a x, b y x = y = 2 m, a = b = m. Promise: Either x = y or they differ in exactly 2 m 1 bits. Quantum strategy: Alice and Bob share 2m qbits in state 1 n j j j They each perform j ( 1) x j j Quantum Pseudo-Telepathy p.18/24

19 Deutsch-Jozsa Games (ii) They both apply Hadamard gates to their registers which gives a correct answer Classical solutions can t exist for sufficiently large m. Classical solutions exist for m = 1, 2 (easy) and m = 3. No classical solution for m = 4. Open problem for m > 4 (unknown boundary) Quantum Pseudo-Telepathy p.19/24

20 Matching Game (i) A perfect matching of size m is a partition of {0, 1,..., m 1} to m 2 sets of size 2. Alice receives an m-bit string x = x 0 x 1... x m 1, Bob receives a perfect matching M of size m. Alice must output a string a {0, 1} lg m and Bob a pair (α, β) M and a string b {0, 1} lg m s.t. x α x β = (α β) (a b) Quantum Pseudo-Telepathy p.20/24

21 Hidden Matching Problem Alice receives an m-bit string x = x 0 x 1... x m 1, Bob receives a perfect matching M of size m. Alice sends a message to Bob, and Bob outputs a triple (a, b, c) s.t. (a, b) M and c = x a x b. If Alice sends a message using classical bits, ω(lg m) bits are needed (Bar-Yossef, Jayram, Kerenidis) Quantum Pseudo-Telepathy p.21/24

22 Matching Game (ii) A classical winning strategy for the matching game could be reduced to a solution to the HMP using lg m bits (Alice send a to Bob). Therefore there is no classical winning strategy. Quantum strategy: Alice and Bob share lg m qbits each in state 1 m j j j Alice performs j ( 1) x j j Quantum Pseudo-Telepathy p.22/24

23 Matching Game (ii) Bob performs a partial measurement that brings the system to state 1 2 (( 1) x α αα + ( 1)x β ββ ) s.t. (α, β) M and outputs (α, β). Alice and Bob perform Hadamard transformations and full measurements and output the results a and b. Quantum Pseudo-Telepathy p.23/24

24 Further work How are pseudo-telepathy games related to each other? Categorize families of telepathy games. Investigate relation between complexity problems and pseudo-telepathy Investigate boundaries of pseudo-telepathy Quantum Pseudo-Telepathy p.24/24

Quantum Pseudo-Telepathy

Quantum Pseudo-Telepathy Quantum Pseudo-Telepathy arxiv:quant-ph/04071v3 Nov 004 Gilles Brassard Anne Broadbent Alain Tapp Département IRO, Université de Montréal C.P. 618, succursale centre-ville Montréal (Québec), H3C 3J7 Canada

More information

Tutorial on Quantum Computing. Vwani P. Roychowdhury. Lecture 1: Introduction

Tutorial on Quantum Computing. Vwani P. Roychowdhury. Lecture 1: Introduction Tutorial on Quantum Computing Vwani P. Roychowdhury Lecture 1: Introduction 1 & ) &! # Fundamentals Qubits A single qubit is a two state system, such as a two level atom we denote two orthogonal states

More information

CS286.2 Lecture 8: A variant of QPCP for multiplayer entangled games

CS286.2 Lecture 8: A variant of QPCP for multiplayer entangled games CS286.2 Lecture 8: A variant of QPCP for multiplayer entangled games Scribe: Zeyu Guo In the first lecture, we saw three equivalent variants of the classical PCP theorems in terms of CSP, proof checking,

More information

Quantum Communication

Quantum Communication Quantum Communication Harry Buhrman CWI & University of Amsterdam Physics and Computing Computing is physical Miniaturization quantum effects Quantum Computers ) Enables continuing miniaturization ) Fundamentally

More information

An Introduction to Quantum Information and Applications

An Introduction to Quantum Information and Applications An Introduction to Quantum Information and Applications Iordanis Kerenidis CNRS LIAFA-Univ Paris-Diderot Quantum information and computation Quantum information and computation How is information encoded

More information

Quantum Information & Quantum Computation

Quantum Information & Quantum Computation CS90A, Spring 005: Quantum Information & Quantum Computation Wim van Dam Engineering, Room 509 vandam@cs http://www.cs.ucsb.edu/~vandam/teaching/cs90/ Administrative The Final Examination will be: Monday

More information

On Quantum vs. Classical Communication Complexity

On Quantum vs. Classical Communication Complexity On Quantum vs. Classical Communication Complexity Dmitry Gavinsky Institute of Mathematics, Praha Czech Academy of Sciences Introduction Introduction The setting of communication complexity is one of the

More information

Lecture 20: Bell inequalities and nonlocality

Lecture 20: Bell inequalities and nonlocality CPSC 59/69: Quantum Computation John Watrous, University of Calgary Lecture 0: Bell inequalities and nonlocality April 4, 006 So far in the course we have considered uses for quantum information in the

More information

arxiv: v1 [quant-ph] 14 May 2010

arxiv: v1 [quant-ph] 14 May 2010 arxiv:1005.449v1 [quant-ph] 14 May 010 Quantum Computation and Pseudo-telepathic Games Jeffrey Bub Department of Philosophy, University of Maryland, College Park, MD 074 Abstract A quantum algorithm succeeds

More information

b) (5 points) Give a simple quantum circuit that transforms the state

b) (5 points) Give a simple quantum circuit that transforms the state C/CS/Phy191 Midterm Quiz Solutions October 0, 009 1 (5 points) Short answer questions: a) (5 points) Let f be a function from n bits to 1 bit You have a quantum circuit U f for computing f If you wish

More information

Quantum Communication Complexity

Quantum Communication Complexity Quantum Communication Complexity Ronald de Wolf Communication complexity has been studied extensively in the area of theoretical computer science and has deep connections with seemingly unrelated areas,

More information

Recasting Mermin s multi-player game into the framework of pseudo-telepathy

Recasting Mermin s multi-player game into the framework of pseudo-telepathy Recasting Mermin s multi-player game into the framework of pseudo-telepathy arxiv:quant-ph/040805v 16 Jun 005 Gilles Brassard Anne Broadbent Alain Tapp Département IRO, Université de Montréal C.P. 618,

More information

The one-way communication complexity of the Boolean Hidden Matching Problem

The one-way communication complexity of the Boolean Hidden Matching Problem The one-way communication complexity of the Boolean Hidden Matching Problem Iordanis Kerenidis CRS - LRI Université Paris-Sud jkeren@lri.fr Ran Raz Faculty of Mathematics Weizmann Institute ran.raz@weizmann.ac.il

More information

Seminar 1. Introduction to Quantum Computing

Seminar 1. Introduction to Quantum Computing Seminar 1 Introduction to Quantum Computing Before going in I am also a beginner in this field If you are interested, you can search more using: Quantum Computing since Democritus (Scott Aaronson) Quantum

More information

Quantum information and quantum computing

Quantum information and quantum computing Middle East Technical University, Department of Physics January 7, 009 Outline Measurement 1 Measurement 3 Single qubit gates Multiple qubit gates 4 Distinguishability 5 What s measurement? Quantum measurement

More information

Quantum Simultaneous Contract Signing

Quantum Simultaneous Contract Signing Quantum Simultaneous Contract Signing J. Bouda, M. Pivoluska, L. Caha, P. Mateus, N. Paunkovic 22. October 2010 Based on work presented on AQIS 2010 J. Bouda, M. Pivoluska, L. Caha, P. Mateus, N. Quantum

More information

Bit-Commitment and Coin Flipping in a Device-Independent Setting

Bit-Commitment and Coin Flipping in a Device-Independent Setting Bit-Commitment and Coin Flipping in a Device-Independent Setting J. Silman Université Libre de Bruxelles Joint work with: A. Chailloux & I. Kerenidis (LIAFA), N. Aharon (TAU), S. Pironio & S. Massar (ULB).

More information

Lecture 21: Quantum communication complexity

Lecture 21: Quantum communication complexity CPSC 519/619: Quantum Computation John Watrous, University of Calgary Lecture 21: Quantum communication complexity April 6, 2006 In this lecture we will discuss how quantum information can allow for a

More information

Lecture 6 Sept. 14, 2015

Lecture 6 Sept. 14, 2015 PHYS 7895: Quantum Information Theory Fall 205 Prof. Mark M. Wilde Lecture 6 Sept., 205 Scribe: Mark M. Wilde This document is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 3.0

More information

Quantum Computing: Foundations to Frontier Fall Lecture 3

Quantum Computing: Foundations to Frontier Fall Lecture 3 Quantum Computing: Foundations to Frontier Fall 018 Lecturer: Henry Yuen Lecture 3 Scribes: Seyed Sajjad Nezhadi, Angad Kalra Nora Hahn, David Wandler 1 Overview In Lecture 3, we started off talking about

More information

10 quantum games Quantum Game 1: Bell Quantum Game 2: CHSH Quantum Game 3: GHZ 6 11 why quantum mechanics? Recap 9 11.

10 quantum games Quantum Game 1: Bell Quantum Game 2: CHSH Quantum Game 3: GHZ 6 11 why quantum mechanics? Recap 9 11. C O N T E N T S 10 quantum games 3 10.1 Quantum Game 1: Bell 3 10. Quantum Game : CHSH 5 10.3 Quantum Game 3: GHZ 6 11 why quantum mechanics? 9 11.1 Recap 9 11. Why Quantum Mechanics? 10 11..1 Well, why

More information

Rank-one and Quantum XOR Games

Rank-one and Quantum XOR Games Rank-one and Quantum XOR Games T. Cooney 1 M. Junge 2 C. Palazuelos 3 D. Pérez García 1 and O. Regev 4 T. Vidick 5 1 Universidad Complutense de Madrid 2 University of Illinois at Urbana Champaign 3 Instituto

More information

Unitary evolution: this axiom governs how the state of the quantum system evolves in time.

Unitary evolution: this axiom governs how the state of the quantum system evolves in time. CS 94- Introduction Axioms Bell Inequalities /7/7 Spring 7 Lecture Why Quantum Computation? Quantum computers are the only model of computation that escape the limitations on computation imposed by the

More information

Non-locality and Communication Complexity

Non-locality and Communication Complexity Non-locality and Communication Complexity Harry Buhrman Richard Cleve Serge Massar Ronald de Wolf July 21, 2009 Abstract Quantum information processing is the emerging field that defines and realizes computing

More information

Beginnings... Computers might as well be made of green cheese. It is no longer safe to assume this! The first axiom I learnt in Computer Science:

Beginnings... Computers might as well be made of green cheese. It is no longer safe to assume this! The first axiom I learnt in Computer Science: Beginnings... The first axiom I learnt in Computer Science: Computers might as well be made of green cheese It is no longer safe to assume this! (Department of Computer Science, Quantum Universitycomputation:

More information

6.896 Quantum Complexity Theory November 4th, Lecture 18

6.896 Quantum Complexity Theory November 4th, Lecture 18 6.896 Quantum Complexity Theory November 4th, 2008 Lecturer: Scott Aaronson Lecture 18 1 Last Time: Quantum Interactive Proofs 1.1 IP = PSPACE QIP = QIP(3) EXP The first result is interesting, because

More information

The Lovász ϑ-function in Quantum Mechanics

The Lovász ϑ-function in Quantum Mechanics The Lovász ϑ-function in Quantum Mechanics Zero-error Quantum Information and Noncontextuality Simone Severini UCL Oxford Jan 2013 Simone Severini (UCL) Lovász ϑ-function in Quantum Mechanics Oxford Jan

More information

Simultaneous Communication Protocols with Quantum and Classical Messages

Simultaneous Communication Protocols with Quantum and Classical Messages Simultaneous Communication Protocols with Quantum and Classical Messages Oded Regev Ronald de Wolf July 17, 2008 Abstract We study the simultaneous message passing model of communication complexity, for

More information

Characterization of Binary Constraint System Games Richard Cleve and Rajat Mittal ICALP 2014 and QIP 2014

Characterization of Binary Constraint System Games Richard Cleve and Rajat Mittal ICALP 2014 and QIP 2014 Characterization of Binary Constraint System Games Richard Cleve and Rajat Mittal ICALP 2014 and QIP 2014 Dhruv Singal 1 1 Department of Computer Science and Engineering, IIT Kanpur E-mail: dhruv@iitk.ac.in

More information

CPSC 467b: Cryptography and Computer Security

CPSC 467b: Cryptography and Computer Security CPSC 467b: Cryptography and Computer Security Michael J. Fischer Lecture 11 February 21, 2013 CPSC 467b, Lecture 11 1/27 Discrete Logarithm Diffie-Hellman Key Exchange ElGamal Key Agreement Primitive Roots

More information

Simultaneous Communication Protocols with Quantum and Classical Messages

Simultaneous Communication Protocols with Quantum and Classical Messages Simultaneous Communication Protocols with Quantum and Classical Messages Dmitry Gavinsky Oded Regev Ronald de Wolf December 29, 2008 Abstract We study the simultaneous message passing (SMP) model of communication

More information

Adriaan van Wijngaarden

Adriaan van Wijngaarden Adriaan van Wijngaarden From his Wikipedia article: His education was in mechanical engineering, for which he received a degree from Delft University of Technology in 1939. He then studied for a doctorate

More information

Relativistic quantum pseudo-telepathy

Relativistic quantum pseudo-telepathy Relativistic quantum pseudo-telepathy P. Gawron Ł. Pawela Institute of Theoretical and Applied Informatics, Polish Academy of Sciences, Bałtycka 5, 44-100 Gliwice, Poland 09.IX.2014 arxiv:1409.2708v1 [quant-ph]

More information

Quantum Error Correcting Codes and Quantum Cryptography. Peter Shor M.I.T. Cambridge, MA 02139

Quantum Error Correcting Codes and Quantum Cryptography. Peter Shor M.I.T. Cambridge, MA 02139 Quantum Error Correcting Codes and Quantum Cryptography Peter Shor M.I.T. Cambridge, MA 02139 1 We start out with two processes which are fundamentally quantum: superdense coding and teleportation. Superdense

More information

CS 282A/MATH 209A: Foundations of Cryptography Prof. Rafail Ostrovsky. Lecture 10

CS 282A/MATH 209A: Foundations of Cryptography Prof. Rafail Ostrovsky. Lecture 10 CS 282A/MATH 209A: Foundations of Cryptography Prof. Rafail Ostrovsky Lecture 10 Lecture date: 14 and 16 of March, 2005 Scribe: Ruzan Shahinian, Tim Hu 1 Oblivious Transfer 1.1 Rabin Oblivious Transfer

More information

Quantum Teleportation Pt. 3

Quantum Teleportation Pt. 3 Quantum Teleportation Pt. 3 PHYS 500 - Southern Illinois University March 7, 2017 PHYS 500 - Southern Illinois University Quantum Teleportation Pt. 3 March 7, 2017 1 / 9 A Bit of History on Teleportation

More information

Single qubit + CNOT gates

Single qubit + CNOT gates Lecture 6 Universal quantum gates Single qubit + CNOT gates Single qubit and CNOT gates together can be used to implement an arbitrary twolevel unitary operation on the state space of n qubits. Suppose

More information

Advanced Cryptography Quantum Algorithms Christophe Petit

Advanced Cryptography Quantum Algorithms Christophe Petit The threat of quantum computers Advanced Cryptography Quantum Algorithms Christophe Petit University of Oxford Christophe Petit -Advanced Cryptography 1 Christophe Petit -Advanced Cryptography 2 The threat

More information

Theory of Computation Chapter 12: Cryptography

Theory of Computation Chapter 12: Cryptography Theory of Computation Chapter 12: Cryptography Guan-Shieng Huang Dec. 20, 2006 0-0 Introduction Alice wants to communicate with Bob secretely. x Alice Bob John Alice y=e(e,x) y Bob y??? John Assumption

More information

EPR paradox, Bell inequality, etc.

EPR paradox, Bell inequality, etc. EPR paradox, Bell inequality, etc. Compatible and incompatible observables AA, BB = 0, then compatible, can measure simultaneously, can diagonalize in one basis commutator, AA, BB AAAA BBBB If we project

More information

Grothendieck Inequalities, XOR games, and Communication Complexity

Grothendieck Inequalities, XOR games, and Communication Complexity Grothendieck Inequalities, XOR games, and Communication Complexity Troy Lee Rutgers University Joint work with: Jop Briët, Harry Buhrman, and Thomas Vidick Overview Introduce XOR games, Grothendieck s

More information

Efficient communication for the list problem

Efficient communication for the list problem Efficient communication for the list problem Joran van Apeldoorn July 18, 014 Bachelorthesis Main Supervisor: Supervisors: prof. dr. Harry Buhrman dr. Leen Torenvliet prof. dr. Hans Maassen Korteweg-de

More information

Non-locality and Communication Complexity

Non-locality and Communication Complexity Non-locality and Communication Complexity Harry Buhrman Richard Cleve Serge Massar Ronald de Wolf July 20, 2009 Abstract Quantum information processing is the emerging field that defines and realizes computing

More information

CAT L4: Quantum Non-Locality and Contextuality

CAT L4: Quantum Non-Locality and Contextuality CAT L4: Quantum Non-Locality and Contextuality Samson Abramsky Department of Computer Science, University of Oxford Samson Abramsky (Department of Computer Science, University CAT L4: of Quantum Oxford)

More information

Fourier Sampling & Simon s Algorithm

Fourier Sampling & Simon s Algorithm Chapter 4 Fourier Sampling & Simon s Algorithm 4.1 Reversible Computation A quantum circuit acting on n qubits is described by an n n unitary operator U. Since U is unitary, UU = U U = I. This implies

More information

Lecture 21: Quantum Communication

Lecture 21: Quantum Communication CS 880: Quantum Information Processing 0/6/00 Lecture : Quantum Communication Instructor: Dieter van Melkebeek Scribe: Mark Wellons Last lecture, we introduced the EPR airs which we will use in this lecture

More information

CSCI 2570 Introduction to Nanocomputing. Discrete Quantum Computation

CSCI 2570 Introduction to Nanocomputing. Discrete Quantum Computation CSCI 2570 Introduction to Nanocomputing Discrete Quantum Computation John E Savage November 27, 2007 Lect 22 Quantum Computing c John E Savage What is Quantum Computation It is very different kind of computation

More information

CS 282A/MATH 209A: Foundations of Cryptography Prof. Rafail Ostrosky. Lecture 4

CS 282A/MATH 209A: Foundations of Cryptography Prof. Rafail Ostrosky. Lecture 4 CS 282A/MATH 209A: Foundations of Cryptography Prof. Rafail Ostrosky Lecture 4 Lecture date: January 26, 2005 Scribe: Paul Ray, Mike Welch, Fernando Pereira 1 Private Key Encryption Consider a game between

More information

CS Foundations of Communication Complexity

CS Foundations of Communication Complexity CS 2429 - Foundations of Communication Complexity Lecturer: Sergey Gorbunov 1 Introduction In this lecture we will see how to use methods of (conditional) information complexity to prove lower bounds for

More information

CS Communication Complexity: Applications and New Directions

CS Communication Complexity: Applications and New Directions CS 2429 - Communication Complexity: Applications and New Directions Lecturer: Toniann Pitassi 1 Introduction In this course we will define the basic two-party model of communication, as introduced in the

More information

Lecture 4: Postulates of quantum mechanics

Lecture 4: Postulates of quantum mechanics Lecture 4: Postulates of quantum mechanics Rajat Mittal IIT Kanpur The postulates of quantum mechanics provide us the mathematical formalism over which the physical theory is developed. For people studying

More information

Lecture Notes 20: Zero-Knowledge Proofs

Lecture Notes 20: Zero-Knowledge Proofs CS 127/CSCI E-127: Introduction to Cryptography Prof. Salil Vadhan Fall 2013 Lecture Notes 20: Zero-Knowledge Proofs Reading. Katz-Lindell Ÿ14.6.0-14.6.4,14.7 1 Interactive Proofs Motivation: how can parties

More information

CS286.2 Lecture 15: Tsirelson s characterization of XOR games

CS286.2 Lecture 15: Tsirelson s characterization of XOR games CS86. Lecture 5: Tsirelson s characterization of XOR games Scribe: Zeyu Guo We first recall the notion of quantum multi-player games: a quantum k-player game involves a verifier V and k players P,...,

More information

Compute the Fourier transform on the first register to get x {0,1} n x 0.

Compute the Fourier transform on the first register to get x {0,1} n x 0. CS 94 Recursive Fourier Sampling, Simon s Algorithm /5/009 Spring 009 Lecture 3 1 Review Recall that we can write any classical circuit x f(x) as a reversible circuit R f. We can view R f as a unitary

More information

Ph 219/CS 219. Exercises Due: Friday 3 November 2006

Ph 219/CS 219. Exercises Due: Friday 3 November 2006 Ph 9/CS 9 Exercises Due: Friday 3 November 006. Fidelity We saw in Exercise. that the trace norm ρ ρ tr provides a useful measure of the distinguishability of the states ρ and ρ. Another useful measure

More information

Introduction to Quantum Algorithms Part I: Quantum Gates and Simon s Algorithm

Introduction to Quantum Algorithms Part I: Quantum Gates and Simon s Algorithm Part I: Quantum Gates and Simon s Algorithm Martin Rötteler NEC Laboratories America, Inc. 4 Independence Way, Suite 00 Princeton, NJ 08540, U.S.A. International Summer School on Quantum Information, Max-Planck-Institut

More information

On the Role of Shared Entanglement

On the Role of Shared Entanglement On the Role of Shared Entanglement Dmitry Gavinsy David R. Cheriton School of Computer Science and Institute for Quantum Computing University of Waterloo Abstract Despite the apparent similarity between

More information

Lecture 11: Key Agreement

Lecture 11: Key Agreement Introduction to Cryptography 02/22/2018 Lecture 11: Key Agreement Instructor: Vipul Goyal Scribe: Francisco Maturana 1 Hardness Assumptions In order to prove the security of cryptographic primitives, we

More information

Lecture 14, Thurs March 2: Nonlocal Games

Lecture 14, Thurs March 2: Nonlocal Games Lecture 14, Thurs March 2: Nonlocal Games Last time we talked about the CHSH Game, and how no classical strategy lets Alice and Bob win it more than 75% of the time. Today we ll see how, by using entanglement,

More information

AQI: Advanced Quantum Information Lecture 6 (Module 2): Distinguishing Quantum States January 28, 2013

AQI: Advanced Quantum Information Lecture 6 (Module 2): Distinguishing Quantum States January 28, 2013 AQI: Advanced Quantum Information Lecture 6 (Module 2): Distinguishing Quantum States January 28, 2013 Lecturer: Dr. Mark Tame Introduction With the emergence of new types of information, in this case

More information

Quantum Gates, Circuits & Teleportation

Quantum Gates, Circuits & Teleportation Chapter 3 Quantum Gates, Circuits & Teleportation Unitary Operators The third postulate of quantum physics states that the evolution of a quantum system is necessarily unitary. Geometrically, a unitary

More information

Exponential quantum enhancement for distributed addition with local nonlinearity

Exponential quantum enhancement for distributed addition with local nonlinearity Quantum Inf Process (2010) 9:47 59 DOI 10.1007/s11128-009-0126-9 Exponential quantum enhancement for distributed addition with local nonlinearity Adam Henry Marblestone Michel Devoret Received: 7 May 2009

More information

Quantum Communication. Serge Massar Université Libre de Bruxelles

Quantum Communication. Serge Massar Université Libre de Bruxelles Quantum Communication Serge Massar Université Libre de Bruxelles Plan Why Quantum Communication? Prepare and Measure schemes QKD Using Entanglement Teleportation Communication Complexity And now what?

More information

Introduction to Quantum Information Processing

Introduction to Quantum Information Processing Introdction to Qantm Information Processing Lectre 5 Richard Cleve Overview of Lectre 5 Review of some introdctory material: qantm states, operations, and simple qantm circits Commnication tasks: one qbit

More information

Entanglement and information

Entanglement and information Ph95a lecture notes for 0/29/0 Entanglement and information Lately we ve spent a lot of time examining properties of entangled states such as ab è 2 0 a b è Ý a 0 b è. We have learned that they exhibit

More information

Quantum Algorithms for Leader Election Problem in Distributed Systems

Quantum Algorithms for Leader Election Problem in Distributed Systems Quantum Algorithms for Leader Election Problem in Distributed Systems Pradeep Sarvepalli pradeep@cs.tamu.edu Department of Computer Science, Texas A&M University Quantum Algorithms for Leader Election

More information

Lecture 38: Secure Multi-party Computation MPC

Lecture 38: Secure Multi-party Computation MPC Lecture 38: Secure Multi-party Computation Problem Statement I Suppose Alice has private input x, and Bob has private input y Alice and Bob are interested in computing z = f (x, y) such that each party

More information

Hilbert Space, Entanglement, Quantum Gates, Bell States, Superdense Coding.

Hilbert Space, Entanglement, Quantum Gates, Bell States, Superdense Coding. CS 94- Bell States Bell Inequalities 9//04 Fall 004 Lecture Hilbert Space Entanglement Quantum Gates Bell States Superdense Coding 1 One qubit: Recall that the state of a single qubit can be written as

More information

Lecture 15 April 9, 2007

Lecture 15 April 9, 2007 6.851: Advanced Data Structures Spring 2007 Mihai Pătraşcu Lecture 15 April 9, 2007 Scribe: Ivaylo Riskov 1 Overview In the last lecture we considered the problem of finding the predecessor in its static

More information

Nonlocal Quantum XOR Games for Large Number of Players

Nonlocal Quantum XOR Games for Large Number of Players onlocal Quantum XOR Games for Large umber of Players Andris Ambainis, Dmitry Kravchenko, ikolajs ahimovs, Alexander Rivosh Faculty of Computing, University of Latvia Abstract onlocal games are used to

More information

CS/Ph120 Homework 4 Solutions

CS/Ph120 Homework 4 Solutions CS/Ph10 Homework 4 Solutions November 3, 016 Problem 1: Robustness of GHZ and W states, part Solution: Due to Bolton Bailey a For the GHZ state, we have T r N GHZ N GHZ N = 1 0 N 1 0 N 1 + 1 N 1 1 N 1

More information

Security Implications of Quantum Technologies

Security Implications of Quantum Technologies Security Implications of Quantum Technologies Jim Alves-Foss Center for Secure and Dependable Software Department of Computer Science University of Idaho Moscow, ID 83844-1010 email: jimaf@cs.uidaho.edu

More information

Simulation of quantum computers with probabilistic models

Simulation of quantum computers with probabilistic models Simulation of quantum computers with probabilistic models Vlad Gheorghiu Department of Physics Carnegie Mellon University Pittsburgh, PA 15213, U.S.A. April 6, 2010 Vlad Gheorghiu (CMU) Simulation of quantum

More information

EXPONENTIAL SEPARATION OF QUANTUM AND CLASSICAL ONE-WAY COMMUNICATION COMPLEXITY

EXPONENTIAL SEPARATION OF QUANTUM AND CLASSICAL ONE-WAY COMMUNICATION COMPLEXITY EXPONENTIAL SEPARATION OF QUANTUM AND CLASSICAL ONE-WAY COMMUNICATION COMPLEXITY ZIV BAR-YOSSEF, T. S. JAYRAM, AND IORDANIS KERENIDIS Abstract. We give the first exponential separation between quantum

More information

An exponential separation between quantum and classical one-way communication complexity

An exponential separation between quantum and classical one-way communication complexity An exponential separation between quantum and classical one-way communication complexity Ashley Montanaro Centre for Quantum Information and Foundations, Department of Applied Mathematics and Theoretical

More information

Lecture Lecture 9 October 1, 2015

Lecture Lecture 9 October 1, 2015 CS 229r: Algorithms for Big Data Fall 2015 Lecture Lecture 9 October 1, 2015 Prof. Jelani Nelson Scribe: Rachit Singh 1 Overview In the last lecture we covered the distance to monotonicity (DTM) and longest

More information

Short introduction to Quantum Computing

Short introduction to Quantum Computing November 7, 2017 Short introduction to Quantum Computing Joris Kattemölle QuSoft, CWI, Science Park 123, Amsterdam, The Netherlands Institute for Theoretical Physics, University of Amsterdam, Science Park

More information

Quantum Cryptography

Quantum Cryptography Quantum Cryptography Christian Schaffner Research Center for Quantum Software Institute for Logic, Language and Computation (ILLC) University of Amsterdam Centrum Wiskunde & Informatica Winter 17 QuantumDay@Portland

More information

Bell s inequalities and their uses

Bell s inequalities and their uses The Quantum Theory of Information and Computation http://www.comlab.ox.ac.uk/activities/quantum/course/ Bell s inequalities and their uses Mark Williamson mark.williamson@wofson.ox.ac.uk 10.06.10 Aims

More information

Lecture 1: Overview of quantum information

Lecture 1: Overview of quantum information CPSC 59/69: Quantum Computation John Watrous, University of Calgary References Lecture : Overview of quantum information January 0, 006 Most of the material in these lecture notes is discussed in greater

More information

INTRODUCTION TO QUANTUM COMPUTING

INTRODUCTION TO QUANTUM COMPUTING INTRODUCTION TO QUANTUM COMPUTING Writen by: Eleanor Rieffel and Wolfgang Polak Presented by: Anthony Luaders OUTLINE: Introduction Notation Experiment Quantum Bit Quantum Key Distribution Multiple Qubits

More information

arxiv:quant-ph/ v2 11 Jan 2010

arxiv:quant-ph/ v2 11 Jan 2010 Consequences and Limits of Nonlocal Strategies Richard Cleve Peter Høyer Ben Toner John Watrous January 11, 2010 arxiv:quant-ph/0404076v2 11 Jan 2010 Abstract This paper investigates the powers and limitations

More information

Lecture: Quantum Information

Lecture: Quantum Information Lecture: Quantum Information Transcribed by: Crystal Noel and Da An (Chi Chi) November 10, 016 1 Final Proect Information Find an issue related to class you are interested in and either: read some papers

More information

Some limits on non-local randomness expansion

Some limits on non-local randomness expansion Some limits on non-local randomness expansion Matt Coudron and Henry Yuen December 12, 2012 1 Introduction God does not play dice. Albert Einstein Einstein, stop telling God what to do. Niels Bohr One

More information

An Introduction to Quantum Computation and Quantum Information

An Introduction to Quantum Computation and Quantum Information An to and Graduate Group in Applied Math University of California, Davis March 13, 009 A bit of history Benioff 198 : First paper published mentioning quantum computing Feynman 198 : Use a quantum computer

More information

Quantum mysteries revisited again

Quantum mysteries revisited again Quantum mysteries revisited again P. K. Aravind a) Physics Department, Worcester Polytechnic Institute, Worcester, Massachusetts 01609 Received 30 April 2002; accepted 21 May 2004 This paper describes

More information

Instantaneous Nonlocal Measurements

Instantaneous Nonlocal Measurements Instantaneous Nonlocal Measurements Li Yu Department of Physics, Carnegie-Mellon University, Pittsburgh, PA July 22, 2010 References Entanglement consumption of instantaneous nonlocal quantum measurements.

More information

Quantum sampling of mixed states

Quantum sampling of mixed states Quantum sampling of mixed states Philippe Lamontagne January 7th Philippe Lamontagne Quantum sampling of mixed states January 7th 1 / 9 The setup Philippe Lamontagne Quantum sampling of mixed states January

More information

Lecture 1: Perfect Secrecy and Statistical Authentication. 2 Introduction - Historical vs Modern Cryptography

Lecture 1: Perfect Secrecy and Statistical Authentication. 2 Introduction - Historical vs Modern Cryptography CS 7880 Graduate Cryptography September 10, 2015 Lecture 1: Perfect Secrecy and Statistical Authentication Lecturer: Daniel Wichs Scribe: Matthew Dippel 1 Topic Covered Definition of perfect secrecy One-time

More information

Fourier analysis of boolean functions in quantum computation

Fourier analysis of boolean functions in quantum computation Fourier analysis of boolean functions in quantum computation Ashley Montanaro Centre for Quantum Information and Foundations, Department of Applied Mathematics and Theoretical Physics, University of Cambridge

More information

Information Complexity and Applications. Mark Braverman Princeton University and IAS FoCM 17 July 17, 2017

Information Complexity and Applications. Mark Braverman Princeton University and IAS FoCM 17 July 17, 2017 Information Complexity and Applications Mark Braverman Princeton University and IAS FoCM 17 July 17, 2017 Coding vs complexity: a tale of two theories Coding Goal: data transmission Different channels

More information

6.896 Quantum Complexity Theory 30 October Lecture 17

6.896 Quantum Complexity Theory 30 October Lecture 17 6.896 Quantum Complexity Theory 30 October 2008 Lecturer: Scott Aaronson Lecture 17 Last time, on America s Most Wanted Complexity Classes: 1. QMA vs. QCMA; QMA(2). 2. IP: Class of languages L {0, 1} for

More information

Untrusted quantum devices. Yaoyun Shi University of Michigan updated Feb. 1, 2014

Untrusted quantum devices. Yaoyun Shi University of Michigan updated Feb. 1, 2014 Untrusted quantum devices Yaoyun Shi University of Michigan updated Feb. 1, 2014 Quantum power is incredible! Quantum power is incredible! Quantum power is incredible! Spooky action at a distance Quantum

More information

arxiv: v7 [quant-ph] 20 Mar 2017

arxiv: v7 [quant-ph] 20 Mar 2017 Quantum oblivious transfer and bit commitment protocols based on two non-orthogonal states coding arxiv:1306.5863v7 [quant-ph] 0 Mar 017 Li Yang State Key Laboratory of Information Security, Institute

More information

Introduction to Cryptography Lecture 13

Introduction to Cryptography Lecture 13 Introduction to Cryptography Lecture 13 Benny Pinkas June 5, 2011 Introduction to Cryptography, Benny Pinkas page 1 Electronic cash June 5, 2011 Introduction to Cryptography, Benny Pinkas page 2 Simple

More information

Lecture th January 2009 Fall 2008 Scribes: D. Widder, E. Widder Today s lecture topics

Lecture th January 2009 Fall 2008 Scribes: D. Widder, E. Widder Today s lecture topics 0368.4162: Introduction to Cryptography Ran Canetti Lecture 11 12th January 2009 Fall 2008 Scribes: D. Widder, E. Widder Today s lecture topics Introduction to cryptographic protocols Commitments 1 Cryptographic

More information

Quantum Computing. Thorsten Altenkirch

Quantum Computing. Thorsten Altenkirch Quantum Computing Thorsten Altenkirch Is Computation universal? Alonzo Church - calculus Alan Turing Turing machines computable functions The Church-Turing thesis All computational formalisms define the

More information

Quantum Information Processing

Quantum Information Processing Quantum Information Processing Harry Buhrman CWI & University of Amsterdam Physics and Computing Computing is physical Miniaturization quantum effects Quantum Computers 1) Enables continuing miniaturization

More information

CS257 Discrete Quantum Computation

CS257 Discrete Quantum Computation CS57 Discrete Quantum Computation John E Savage April 30, 007 Lect 11 Quantum Computing c John E Savage Classical Computation State is a vector of reals; e.g. Booleans, positions, velocities, or momenta.

More information

Quantum Computing Lecture Notes, Extra Chapter. Hidden Subgroup Problem

Quantum Computing Lecture Notes, Extra Chapter. Hidden Subgroup Problem Quantum Computing Lecture Notes, Extra Chapter Hidden Subgroup Problem Ronald de Wolf 1 Hidden Subgroup Problem 1.1 Group theory reminder A group G consists of a set of elements (which is usually denoted

More information