CS286.2 Lecture 15: Tsirelson s characterization of XOR games

Similar documents
CS286.2 Lecture 8: A variant of QPCP for multiplayer entangled games

Lecture 20: Bell inequalities and nonlocality

2. Introduction to quantum mechanics

Nonlocal games and XOR games

Explicit bounds on the entangled value of multiplayer XOR games. Joint work with Thomas Vidick (MIT)

Quantum Computing Lecture 2. Review of Linear Algebra

Introduction to Quantum Mechanics

Lecture 6 Sept. 14, 2015

Lecture 4: Postulates of quantum mechanics

Lecture: Quantum Information

The CHSH game as a Bell test thought experiment

Quantum NP - Cont. Classical and Quantum Computation A.Yu Kitaev, A. Shen, M. N. Vyalyi 2002

Quantum Computing Lecture 3. Principles of Quantum Mechanics. Anuj Dawar

Ph 219/CS 219. Exercises Due: Friday 3 November 2006

Quantum Nonlocality Pt. 4: More on the CHSH Inequality

arxiv:quant-ph/ v2 11 Jan 2010

Lecture 12c: The range of classical and quantum correlations

Grothendieck Inequalities, XOR games, and Communication Complexity

Quantum state discrimination with post-measurement information!

Rank-one and Quantum XOR Games

Chapter 5. Density matrix formalism

Hilbert Space, Entanglement, Quantum Gates, Bell States, Superdense Coding.

Bit-Commitment and Coin Flipping in a Device-Independent Setting

An Introduction to Quantum Information. By Aditya Jain. Under the Guidance of Dr. Guruprasad Kar PAMU, ISI Kolkata

Introduction to Quantum Information Processing QIC 710 / CS 768 / PH 767 / CO 681 / AM 871

(Non-)Contextuality of Physical Theories as an Axiom

Linear Analysis Lecture 5

Quantum information and quantum computing

Nonlocal Quantum XOR Games for Large Number of Players

Ph 219/CS 219. Exercises Due: Friday 20 October 2006

The following definition is fundamental.

The Lovász ϑ-function in Quantum Mechanics

2. Review of Linear Algebra

AQI: Advanced Quantum Information Lecture 6 (Module 2): Distinguishing Quantum States January 28, 2013

Quantum Correlations: From Bell inequalities to Tsirelson s theorem

Elementary linear algebra

Introduction to quantum information processing

Linear Algebra Massoud Malek

Quantum strategy, Quantum correlations and Operator algebras

Instantaneous Nonlocal Measurements

Tutorial on Quantum Computing. Vwani P. Roychowdhury. Lecture 1: Introduction

Lecture 8 : Eigenvalues and Eigenvectors

CS/Ph120 Homework 1 Solutions

Lecture 3: Review of Linear Algebra

Quantum and non-signalling graph isomorphisms

. Here we are using the standard inner-product over C k to define orthogonality. Recall that the inner-product of two vectors φ = i α i.

Tutorial 5 Clifford Algebra and so(n)

Lecture 2: November 9

Mathematical Methods wk 1: Vectors

Mathematical Methods wk 1: Vectors

Hilbert Spaces. Hilbert space is a vector space with some extra structure. We start with formal (axiomatic) definition of a vector space.

SUPERDENSE CODING AND QUANTUM TELEPORTATION

Lecture 2: From Classical to Quantum Model of Computation

Entanglement, games and quantum correlations

REPRESENTATION THEORY WEEK 7

MATH 20F: LINEAR ALGEBRA LECTURE B00 (T. KEMP)

Generalized Tsirelson Inequalities, Commuting-Operator Provers, and Multi-Prover Interactive Proof Systems

Single qubit + CNOT gates

Compute the Fourier transform on the first register to get x {0,1} n x 0.

Vectors in Function Spaces

Linear Algebra. Session 12

Lecture 3: Constructing a Quantum Model

Quantum Gates, Circuits & Teleportation

Lecture 6: Quantum error correction and quantum capacity

Homework 3 - Solutions

08a. Operators on Hilbert spaces. 1. Boundedness, continuity, operator norms

The Framework of Quantum Mechanics

Bell inequality for qunits with binary measurements

arxiv: v2 [quant-ph] 21 Oct 2013

Introduction to Quantum Computing

Lecture 15: Expanders

Probabilistic exact cloning and probabilistic no-signalling. Abstract

Lecture 3: Review of Linear Algebra

Lecture 21: HSP via the Pretty Good Measurement

Algebra II. Paulius Drungilas and Jonas Jankauskas

Math 350 Fall 2011 Notes about inner product spaces. In this notes we state and prove some important properties of inner product spaces.

Lecture If two operators A, B commute then they have same set of eigenkets.

DS-GA 1002 Lecture notes 0 Fall Linear Algebra. These notes provide a review of basic concepts in linear algebra.

Lecture 2: Linear Algebra Review

By allowing randomization in the verification process, we obtain a class known as MA.

Asymptotic Pure State Transformations

Unitary evolution: this axiom governs how the state of the quantum system evolves in time.

INNER PRODUCT SPACE. Definition 1

CS/Ph120 Homework 8 Solutions

Lecture 2: Linear operators

Grothendieck s Inequality

Einstein-Podolsky-Rosen correlations and Bell correlations in the simplest scenario

CS/Ph120 Homework 4 Solutions

arxiv: v1 [quant-ph] 23 May 2015

Math Linear Algebra II. 1. Inner Products and Norms

Lecture 14, Thurs March 2: Nonlocal Games

Computational Algebraic Topology Topic B Lecture III: Quantum Realizability

Structure of Unital Maps and the Asymptotic Quantum Birkhoff Conjecture. Peter Shor MIT Cambridge, MA Joint work with Anand Oza and Dimiter Ostrev

Lecture 17 (Nov 3, 2011 ): Approximation via rounding SDP: Max-Cut

9. Distance measures. 9.1 Classical information measures. Head Tail. How similar/close are two probability distributions? Trace distance.

Semidefinite Programming (SDP)

Entanglement Measures and Monotones

CS286.2 Lecture 13: Quantum de Finetti Theorems

Lecture 21: Quantum communication complexity

Ph 219b/CS 219b. Exercises Due: Wednesday 20 November 2013

Transcription:

CS86. Lecture 5: Tsirelson s characterization of XOR games Scribe: Zeyu Guo We first recall the notion of quantum multi-player games: a quantum k-player game involves a verifier V and k players P,..., P k. The verifier randomly picks an index i according to some distribution π over the set {,..., Q and sends a quantum state ϕ i (the question) to the the players. Here ϕ i consists of k quantum registers, ϕ i = ϕ i P P k, but it is not necessarily a product state. ach player P j applies a unitary operator U j on his register P j, as well as his ancilla qubits, and sends part of the resulting state back to the verifier. The verifier then performs a measurement M i = {Acc i, Rej i on the answers and decides to accept or reject according to the output. The value w(g) of a game G is defined to be the maximum probability that the verifier accepts, ranging over all possible strategies of players (i.e. all unitary operators U j ). Here the ancilla that each player uses is initially set to 0. The entangled value w (G) is defined in the same way, except that the players have the freedom to use an arbitrary (and possibly entangled across all of them) initial ancilla state. The classical PCP theorem can be interpreted as a statement that approximating w(g) within some constant factor is NP-hard, even for -player games with a poly-size question set and constant-size answers. Similarly, the game variant of the quantum PCP conjecture asks: is it QMA-hard to approximate w (G) within a constant factor? However, we note that even the NP-hardness of approximating w (G) is not obvious. This is because the usual reduction from CSPs to games breaks down when there is entanglement, as we have seen in the example of the Magic Square game. So we need to find another reduction. In this lecture, we study XOR games, a simple class of games for which no such reduction exists (unless NP = P): for XOR games, w(g) is NP-hard to approximate, but there exist polynomial time algorithms computing w (G)! Definition (XOR game). An XOR game is a -player classical game (i.e. questions and answers are all classical) in which: questions are (s, t) chosen from {0,..., n according to some distribution π; answers are bits a, b {0, ; the verifier s predicate V(a, b s, t) = f s,t (a b) only depends on a b, where denotes the XOR operation. We will see two famous examples of XOR games. The first example, the CHSH game, is one of the most famous games in quantum information theory. xample (CHSH game). Here n = and s, t {0, are independent random bits. V(a, b s, t) = iff a b = s t. And we let It is not hard to show that w(g) = 3/: both players just answer zero and this is the best they can do. However, CHSH (Clauser, Horne, Shimony, Holt) observed that w (G) cos ( π 8 ) = 0.85..., achieved by the following strategy:

ψ (0) = ψ ψ ( π 8 )) ψ ( π 8 ) ψ ( π ) ψ 0 ( π ) ψ 0 ( π 8 )) ψ 0 (0) = ψ 0 ψ 0 ( π 8 ) Alice Bob Figure : Alice (resp. Bob) measures using the solid arrows if s = 0 (resp. t = 0), and the dashed arrows if s = (resp. t = ). She/he answers bit i if the outcome corresponds to ψ i (θ) for the appropriate angle θ. Consider an PR pair ψ = ( 0 A 0 B + A B ). For θ [ π, π], define ψ 0 (θ) = cos(θ) 0 + sin(θ) ψ (θ) = sin(θ) 0 + cos(θ). That is, ψ 0 (θ) (resp. ψ (θ) ) is the rotation of 0 (resp. ) by an angle of θ in the real plane spanned by 0 and. Alice measures her qubit of ψ in the basis { ψ 0 (0), ψ (0) if s = 0, and in { ψ 0 ( π ), ψ ( π ) if s =. She answers the bit i if the outcome corresponds to ψ i (0) (resp. ψ i ( π ) ). Bob measures his qubit in the basis { ψ 0 ( π 8 ), ψ ( π 8 ) if s = 0, and in { ψ 0( π 8 ), ψ ( π 8 ) if s =. He answers the bit i if the outcome corresponds to ψ i ( π 8 ) (resp. ψ i( π 8 ). See Figure for an illustration. Next we calculate the winning probability. We could assume that Alice measures first, as the two measurements commute. Consider the case s = 0 and t = 0 where Alice and Bob are supposed to give the same answer. Alice measures her qubit and collapses ψ to ψ A ψ B, where ψ = c ψ i (0) for some scalar c, c =, i {0,, and Alice answers bit i. Then the probability that Bob gets the correct outcome i is ψ i ( π ) ψ = ψ i ( π ) ψ i(0) = cos ( π 8 ). It is easy to check in the same way that Alice and Bob win with probability exactly cos ( π 8 ) as well in all the other cases. Overall the winning probability is cos ( π 8 ). Tsirelson showed that this is indeed the best strategy, and hence w (G) is exactly cos ( π 8 ). We will see the proof later. The next example is the MAXCUT game, one of the most famous games in CS. xample 3 (MAXCUT game). Let G = G(V, ) be an undirected graph. The verifier picks (i, j) at random, chooses (s, t) among (i, j), (j, i), (i, i), (j, j) with equal probability /, and sends s and t to Alice and Bob respectively. The verifier accepts the answer (a, b) from Alice and Bob iff one of the following is true: (s, t) is chosen to be (i, j) or (j, i), and a b = ; (s, t) is chosen to be (i, i) or (j, j), and a b = 0.

We first consider the classical game value w(g). For a = a(s), b = b(t) {0,, we write x s = ( ) a, y t = ( ) b {, and use (x s ) s V, (y t ) t V to represent Alice and Bob s strategy. Then [ ( xi y j w(g) = max + x jy i + + x iy i + + x )] jy j (x s ) s V,(y t ) t V (i,j) = [ ] + max (xi x j )(y i y j ) (x s ) s V,(y t ) t V (i,j) 8 [ ( + ) ] max xi x j (Cauchy-Schwarz) (x s ) s V (i,j) = + #MAXCUT #DGS. ( ) xi x The last step follows by noting that j contributes if xi = x j, and 0 otherwise, and hence it counts the number of edges in the cut defined by (x s ) s V. Also note that the inequality in the second to last step is in fact an equality. We conclude that w(g) = + #MAXCUT #DGS. But we know that MAXCUT is NP-hard. And the PCP theorem implies that even approximating MAXCUT is NP-hard. So we have Corollary. w(g) is NP-hard to approximate within a factor + c for some constant c > 0. What about w (G)? We will see that it is easy to exactly compute w (G) by solving semi-definite programs! For this we need to first establish an important characterization of w (G) for general XOR games. Tsirelson s characterization of w (G) The quantum strategy of Alice and Bob in an XOR game can be described by a quantum state ψ AB C d C d, for every question s sent to Alice, a POVM {A 0 s, A s, for every question t sent to Bob, a POVM {B 0 t, B t. Then the probability of answering (a, b) to questions (s, t) is given by ψ A a s B b t ψ. Write A s = A 0 s A s and B t = B 0 t B t. Then A a s = I + ( )a A s, Bt b = I + ( )b B t, a, b {0,. Moreover, POVMs {A 0 s, A s and {B 0 t, B t exactly correspond to Hermitian A s, B t with A s, B t. 3

We have w (G) = sup ψ,{as a,{bt b (s,t) π a,b = sup ψ,{a s,{b t A s,b t Hermitian A s, B t = (s,t) π a,b (s,t) π a,b f s,t (a b) V(a, b s, t) ψ A a s B b t ψ f s,t (a b) ψ + sup ψ,{a s,{b t A s,b t Hermitian A s, B t I + ( ) a A s (s,t) π I + ( )b B t g s,t ψ A s B t ψ ψ where g s,t := f s,t (0) f s,t (). Note that the first term in the last line is the expected value for random answers, and does not depend on the players strategy. So we introduce the bias β (G) := sup ψ,{a s,{b t A s,b t Hermitian A s, B t (s,t) π g s,t ψ A s B t ψ as the advantage the players can possibly have over the random strategy: w (G) = (s,t) π a,b f s,t (a b) + β (G). A further simplification: while in general A s and B t are Hermitians with norm at most one, for the best strategy we can further assume w.l.o.g. that they are actually observables, i.e., the eigenvalues of A s and B t are ±, or equivalently A s = B t = I. To see this, note that for fixed ψ and B t, the value w (G) is linear in the matrices A s, and by convexity, the best choice can be assumed to be at an extreme point of the unit ball of Hermitian matrices, i.e., all A s (and similarly all B t ) are observables. xample 5. In the CHSH game, Alice s measurements are {A 0 0 = 0 0, A 0 = and {A0 = + +, A =, and A 0 = 0 0 and A = + + are observables. The case for Bob is similar. Theorem 6 (Tsirelson). Given an n n complex matrix C = (C s,t ), the following are equivalent: i) there exist d N, ψ C d C d, A s, B t Herm(C d ), A s = B t = I, such that C s,t = ψ A s B t ψ ; ii) there exist real unit vectors x s, y t R n+ for s, t n such that C s,t = x s y t ; iii) the same as (i) but d n+. Proof. (iii) = (i): trivial. (i) = (ii): For each s, t, define x s = (A s I) ψ, y t = (I B t ) ψ C d. Then x s y t = C s,t. Write x s = i u i e i and y t = i v i e i in some fixed orthonormal basis { e i of C d. Define real vectors x s, y t R d : x s = (Re(u ), Im(u ),..., Re(u d ), Im(u d )), y t = (Re(v ), Im(v ),..., Re(v d ), Im(v d )).

Then x s y t = Re( i u i v i ) = Re( x s y t ) = Re(C s,t ). But A s, B t being Hermitian implies that C s,t is real. So x s y t = C s,t. We also have x s = Re( x s x s ) =, so all x s, and similarly all y t, are unit vectors. The only problem is that the dimension is d rather than n +. But note that replacing each x s by its orthogonal projection onto the subspace spanned by all y t does not affect any x s y t. So we may assume all x s and y t lie in an n-dimensional subspace. By representing x s, y t in an orthonormal basis of this subspace, we have x s, y t R n and x s y t = C s,t. Finally, note that projecting x s and y t shrinks their norms. But we can fix it by enlarging the dimension by two. For each x s we add two coordinates ( x s, 0). And for each y t the new coordinates are (0, y t ). It does not affect x s y t and hence all properties are satisfied. (ii) = (iii): Choose d = n+ and consider the maximal entangled state ψ = d i= d i i. This state has the property that for any A = (A ij ), B = (B ij ), ψ A B ψ = d i A j i B j = d i,j i,j A ij B ji = d i (AB ) ii = d Tr(AB ). Next we need a construction of anti-commuting matrices. This is a representation of the Clifford algebra. Recall the Pauli matrices ( ) ( ) ( ) 0 0 i 0 X =, Y =, Z =. 0 i 0 0 They anti-commute and all square to the identity. For i n+, define the d d matrices T i = I I X Y Y, i n+ i T i = I I Z Y Y. i n+ i All of them are Hermitian, square to the identity, and mutually anti-commute. For s, t n, define A s = n+ i= (x s) i T i and B t = n+ i= (y t) i T i. Then for all s n, A s = (x s ) i T i + (x s ) i (x s ) j (T i T j + T j T i ) = (x s ) i i i<j T i = x s I = I. i =0 Similarly B t = I for all t n. Finally, ψ A s B t ψ = d Tr(A sb t ) = d (x s ) i (y t ) j Tr(T i T j ) i,j = d i = d i (x s ) i (y t ) i Tr(Ti ) + d s ) i (y t ) j Tr(T i T j + T j T i ) i<j(x =0 (x s ) i (y t ) i Tr(I) = x s y t which equals C s,t, as desired. 5

This theorem is very powerful. From (i) (ii), we have an alternative characterization of the bias β (G): β (G) = sup g s,t x s y t. ( ) R n+, x s = y t = (s,t) π Note that the supremum is now over a compact set of bounded dimension n +, and hence is actually a maximum. And from (i) (iii), we have a bound n+ for the dimension of an optimal strategy ψ. Moreover, the characterization ( ) is a semi-definite program for which polynomial-time algorithms exist. So we could compute β (G), and hence w (G), in polynomial time. xample 7. In the CHSH game, we can check by hand that β (G) : β (G) = sup (x 0 y 0 + x 0 y + x y 0 x y ) = sup (x 0 (y 0 + y ) + x (y 0 y )) sup ( x 0 y 0 + y + x y 0 y ) sup ( y 0 + y + y 0 y ) sup y 0 + y + y 0 y = sup y 0 + y =. So w (G) + = cos ( π 8 ): The strategy we have seen before is optimal! 6