From Adversaries to Algorithms. Troy Lee Rutgers University

Similar documents
Quantum algorithms based on span programs

The query register and working memory together form the accessible memory, denoted H A. Thus the state of the algorithm is described by a vector

Faster quantum algorithm for evaluating game trees

Reflections Reflections

A semi-definite program for quantum query complexity

Lower Bounds on Quantum Query Complexity

Optimal quantum adversary lower bounds for ordered search

Tutorial on the adversary method for quantum and classical lower bounds. Sophie Laplante LRI, Université Paris-Sud Orsay

The quantum query complexity of read-many formulas

The Quantum Query Complexity of the Determinant

The quantum adversary method and classical formula size lower bounds

arxiv: v1 [quant-ph] 9 Jul 2009

The Quantum Query Complexity of Algebraic Properties

The quantum adversary method and classical formula size lower bounds

Improved Quantum Algorithm for Triangle Finding via Combinatorial Arguments

Direct product theorem for discrepancy

Adversary-Based Parity Lower Bounds with Small Probability Bias

arxiv: v3 [quant-ph] 18 Nov 2008

Compute the Fourier transform on the first register to get x {0,1} n x 0.

arxiv:quant-ph/ v2 26 Apr 2007

Quantum walk algorithms

Breaking the Rectangle Bound Barrier against Formula Size Lower Bounds

Introduction to Quantum Computing

Quantum algorithms. Andrew Childs. Institute for Quantum Computing University of Waterloo

arxiv: v1 [quant-ph] 6 Feb 2013

Quantum Query Complexity of Boolean Functions with Small On-Sets

Discrete quantum random walks

Quantum Algorithms for Graph Traversals and Related Problems

Product theorems via semidefinite programming

Lecture 13: Lower Bounds using the Adversary Method. 2 The Super-Basic Adversary Method [Amb02]

Time-Efficient Quantum Walks for 3-Distinctness

Exponential algorithmic speedup by quantum walk

Quantum Algorithms for Finding Constant-sized Sub-hypergraphs

Quantum Algorithms for Element Distinctness

Quantum and Classical Query Complexities of Local Search are Polynomially Related

Hamiltonian simulation and solving linear systems

Lower bounds on the size of semidefinite relaxations. David Steurer Cornell

Ph 219b/CS 219b. Exercises Due: Wednesday 4 December 2013

Quantum algorithms (CO 781, Winter 2008) Prof. Andrew Childs, University of Waterloo LECTURE 1: Quantum circuits and the abelian QFT

Quantum algorithms based on quantum walks. Jérémie Roland (ULB - QuIC) Quantum walks Grenoble, Novembre / 39

QALGO workshop, Riga. 1 / 26. Quantum algorithms for linear algebra.

arxiv: v2 [quant-ph] 23 Aug 2011

Chebyshev Polynomials, Approximate Degree, and Their Applications

Direct product theorem for discrepancy

A Glimpse of Quantum Computation

Quantum algorithms (CO 781/CS 867/QIC 823, Winter 2013) Andrew Childs, University of Waterloo LECTURE 13: Query complexity and the polynomial method

arxiv: v1 [cs.cc] 12 Feb 2009

Algebraic Problems in Computational Complexity

Direct product theorem for discrepancy

arxiv: v6 [quant-ph] 9 Jul 2014

The Polynomial Method Strikes Back: Tight Quantum Query Bounds Via Dual Polynomials

arxiv: v1 [quant-ph] 15 Jan 2019

arxiv: v3 [quant-ph] 3 Jul 2012

Quantum Algorithms for Evaluating Min-Max Trees

Introduction to Quantum Information Processing

Quantum Algorithms for Computing the Boolean Function AND and Verifying Repetition Code

Linear algebra and applications to graphs Part 1

Lecture 10: Eigenvalue Estimation

)j > Riley Tipton Perry University of New South Wales, Australia. World Scientific CHENNAI

Improving Quantum Query Complexity of Boolean Matrix Multiplication Using Graph Collision

Quantum Computing Lecture 6. Quantum Search

Problem Set 2. Assigned: Mon. November. 23, 2015

Fourier Sampling & Simon s Algorithm

Introduction to Quantum Computing

Study Notes on Matrices & Determinants for GATE 2017

Richard Cleve David R. Cheriton School of Computer Science Institute for Quantum Computing University of Waterloo

α x x 0 α x x f(x) α x x α x ( 1) f(x) x f(x) x f(x) α x = α x x 2

Quantum algorithms (CO 781, Winter 2008) Prof. Andrew Childs, University of Waterloo LECTURE 6: Quantum query complexity of the HSP

Math 108b: Notes on the Spectral Theorem

arxiv: v2 [quant-ph] 11 Oct 2016

The quantum threat to cryptography

CMSC Discrete Mathematics FINAL EXAM Tuesday, December 5, 2017, 10:30-12:30

CHAPTER 11. A Revision. 1. The Computers and Numbers therein

Lecture Introduction. 2 Brief Recap of Lecture 10. CS-621 Theory Gems October 24, 2012

THE RANK METHOD AND APPLICATIONS TO POST- QUANTUM CRYPTOGRAPHY

Quantum Query Algorithm Constructions for Computing AND, OR and MAJORITY Boolean Functions

arxiv:quant-ph/ v1 29 May 2003

Meaning of the Hessian of a function in a critical point

Lecture 10: Learning DNF, AC 0, Juntas. 1 Learning DNF in Almost Polynomial Time

Quantum algorithms (CO 781, Winter 2008) Prof. Andrew Childs, University of Waterloo LECTURE 11: From random walk to quantum walk

Quantum query complexity of entropy estimation

Contents. Preface for the Instructor. Preface for the Student. xvii. Acknowledgments. 1 Vector Spaces 1 1.A R n and C n 2

A Quantum Interior Point Method for LPs and SDPs

arxiv:quant-ph/ v1 18 Nov 2004

Lecture 12: Lower Bounds for Element-Distinctness and Collision

Classical and Quantum Algorithms for Finding Cycles

CS264: Beyond Worst-Case Analysis Lecture #11: LP Decoding

INSTITUTE OF MATHEMATICS THE CZECH ACADEMY OF SCIENCES. A trade-off between length and width in resolution. Neil Thapen

Tutorials in Optimization. Richard Socher

Quantum algorithms (CO 781, Winter 2008) Prof. Andrew Childs, University of Waterloo LECTURE 15: Unstructured search and spatial search

U.C. Berkeley CS294: Beyond Worst-Case Analysis Handout 8 Luca Trevisan September 19, 2017

A Review of Quantum Random Walks and their Algorithmic Applications

U.C. Berkeley CS294: Spectral Methods and Expanders Handout 11 Luca Trevisan February 29, 2016

Approximation norms and duality for communication complexity lower bounds

Finding is as easy as detecting for quantum walks

1 Adjacency matrix and eigenvalues

Lecture 22: Counting

Simultaneous Communication Protocols with Quantum and Classical Messages

NP-Completeness Review

Rank minimization via the γ 2 norm

Transcription:

From Adversaries to Algorithms Troy Lee Rutgers University

Quantum Query Complexity As in classical complexity, it is difficult to show lower bounds on the time or number of gates required to solve a problem on a quantum computer. Query complexity is a simpler model which still captures the essence of quantum speedups Grover s O( n) search algorithm, heart of Shor s efficient factoring algorithm. Moreover, in this model we can prove lower bounds! Polynomial method, Quantum Adversary method

Classical Query Model For some function f : {0, 1} n {0, 1}, you want to compute f(x). The function is known but you are only given black box access to input x. Can ask x i =? How many queries are needed on the worst case x?

Quantum Query Model Model is similar, but now can ask queries in superposition. Querying x at index i is modeled by the operator O x i z = ( 1) x i i z. Query acts linearly: O x ( i α i i z ) = i ( 1)x iα i i z. In between queries can do unitary transformations. algorithm, measure the first bit of workspace. At the end of

Classical vs. Quantum Query Complexity: Examples OR function: Quantum Θ( n) [BBBV97,Grover96], Classically Ω(n). Parity function: Quantum Ω(n), Classically Ω(n). Evaluating AND-OR trees: Quantum Θ( n) [FGG08, ACRSZ07], Classically Θ(n 0.753 ) [Saks-Wigderson86].

Sometimes Quantum is Easier Interesting case in point: For formulas with AND, OR, NOT gates with n variables where every variable appears once, the quantum query complexity is resolved: Θ( n) [Barnum-Saks04, Reichardt09]. For randomized query complexity it is still an open problem! Balanced AND-OR trees are believed to be the hardest case, but largest general lower bound is Ω(n 0.51 ) [Heiman-Wigderson91].

Reichardt s Recent Result Characterizes quantum query complexity in terms of a (relatively) simple semidefinite program. This semidefinite program, the general adversary method [Høyer-L- Špalek07], was known to be a lower bound. Reichardt considers the dual of this program, and uses a solution to the dual to construct an algorithm. Now one can construct quantum algorithms just by designing vector systems with certain properties!

Adversary method Adversary method developed by [Ambainis, 2002]. Many competing formulations: weight schemes [Amb03, Zha05], spectral norm of matrices [BSS03], and Kolmogorov complexity [LM04]. All these methods shown equivalent by [Špalek and Szegedy, 2006].

Reinventing the adversary General adversary method ADV ±, while similar in form to previous methods, does not face their limitations. Previous adversary bounds used the principle that a successful algorithm must distinguish yes inputs from no inputs. General adversary method actually makes use of the fact that algorithm computes the function.

General adversary lower bound Considers a potential function. Shows that the potential is large at the start of the algorithm, and small at the end of a successful algorithm. Then it bounds how much the potential function can change in any one step this is essentially bounding how much information the algorithm can learn in any one query. Reichardt s result implies the algorithm is actually able to learn this much information in each step!

General adversary lower bound The potential function is defined by a symmetric matrix Γ with rows and columns indexed by inputs to f. The only requirement is that Γ(x, y) = 0 if f(x) = f(y). The bound is given by max Γ Γ max i [n] Γ D i. where D i (x, y) = 1 if x i y i and 0 otherwise. Intuitively, the principal eigenvector of Γ gives a hard distribution for the algorithm.

The Γ matrix -1 f (0) -1 f (1) -1 f (0) 0 A -1 f (1) A* 0 Notice that the spectral norm of Γ equals that of A.

The Γ D 1 matrix -1 f (0) -1 f (1) 0x 1x 0y 1y 0-1 f (0) B* 0 C* 0 0 C -1 f (1) 0x 1x 0y 1y 0 B 0 The spectral norm of Γ D 1 equals max{ B, C }.

Example: OR function We define the matrix: 1000 0100 0010 0001 0000 1 1 1 1 The spectral norm of this matrix is 4, and the spectral norm of each Γ D i is one. Generalizing this construction we find Q 2 (OR n ) = Ω( n).

Dual program When you look at the dual of the adversary bound, you get the following. You want to find vectors v x,i for every input x and index i [n] such that for all x, y with f(x) f(y) i:x i y i v x,i, v y,i = 1 Objective is to minimize i v x,i 2.

Algorithm Using these vectors, Reichardt designs a weighted bipartite graph. If f(x) = 1 this graph will have a 0-valued eigenvector with support on special node. If f(x) = 0 all eigenvectors with small eigenvalues will have small overlap with special node. Gap is proportional to reciprocal of adversary bound. By doing a quantum walk on the graph, can distinguish which case you are in.

Graph Construction 0 1 0 0 1 0 1 1 2 3 4 5 6 7 target

Conclusions Quite remarkable to have such a meeting of upper and lower bounds. Role of duality. Still many interesting problems where quantum query complexity is unknown. Can studying these vector systems help?