Ph 219b/CS 219b. Exercises Due: Wednesday 22 February 2006

Similar documents
Ph 219b/CS 219b. Exercises Due: Wednesday 11 February 2009

Ph 219b/CS 219b. Exercises Due: Wednesday 20 November 2013

Ph 219b/CS 219b. Exercises Due: Wednesday 4 December 2013

Introduction to Quantum Information Processing

Quantum algorithms (CO 781, Winter 2008) Prof. Andrew Childs, University of Waterloo LECTURE 1: Quantum circuits and the abelian QFT

Introduction to Quantum Algorithms Part I: Quantum Gates and Simon s Algorithm

Lecture 4: Elementary Quantum Algorithms

Simon s algorithm (1994)

Fourier Sampling & Simon s Algorithm

Compute the Fourier transform on the first register to get x {0,1} n x 0.

Lecture 22: Quantum computational complexity

Chapter 10. Quantum algorithms

Simulating classical circuits with quantum circuits. The complexity class Reversible-P. Universal gate set for reversible circuits P = Reversible-P

Quantum algorithms (CO 781, Winter 2008) Prof. Andrew Childs, University of Waterloo LECTURE 6: Quantum query complexity of the HSP

Complex numbers: a quick review. Chapter 10. Quantum algorithms. Definition: where i = 1. Polar form of z = a + b i is z = re iθ, where

1 Quantum Circuits. CS Quantum Complexity theory 1/31/07 Spring 2007 Lecture Class P - Polynomial Time

Introduction to Quantum Computing

Ph 219b/CS 219b. Exercises Due: Wednesday 21 November 2018 H = 1 ( ) 1 1. in quantum circuit notation, we denote the Hadamard gate as

QUANTUM COMPUTATION. Exercise sheet 1. Ashley Montanaro, University of Bristol H Z U = 1 2

6.080/6.089 GITCS May 6-8, Lecture 22/23. α 0 + β 1. α 2 + β 2 = 1

Lecture 3: Constructing a Quantum Model

Quantum Computing Lecture 6. Quantum Search

α x x 0 α x x f(x) α x x α x ( 1) f(x) x f(x) x f(x) α x = α x x 2

Introduction to Quantum Computing

Quantum Computing Lecture Notes, Extra Chapter. Hidden Subgroup Problem

6.896 Quantum Complexity Theory November 11, Lecture 20

C/CS/Phys C191 Quantum Gates, Universality and Solovay-Kitaev 9/25/07 Fall 2007 Lecture 9

Simulation of quantum computers with probabilistic models

First, let's review classical factoring algorithm (again, we will factor N=15 but pick different number)

Grover s algorithm. We want to find aa. Search in an unordered database. QC oracle (as usual) Usual trick

Ph 219/CS 219. Exercises Due: Friday 20 October 2006

Introduction to Quantum Computing

Lecture 1: Overview of quantum information

QIP Note: On the Quantum Fourier Transform and Applications

More advanced codes 0 1 ( , 1 1 (

Lecture 2: From Classical to Quantum Model of Computation

Quantum Computing Lecture 8. Quantum Automata and Complexity

Quantum Computing: Foundations to Frontier Fall Lecture 3

Quantum Algorithms Lecture #2. Stephen Jordan

QUANTUM ARTHUR MERLIN GAMES

arxiv:cs/ v1 [cs.cc] 15 Jun 2005

Quantum Communication Complexity

Quantum algorithms (CO 781/CS 867/QIC 823, Winter 2013) Andrew Childs, University of Waterloo LECTURE 13: Query complexity and the polynomial method

Introduction to Quantum Information, Quantum Computation, and Its Application to Cryptography. D. J. Guan

Quantum Computation. Michael A. Nielsen. University of Queensland

Quantum Computing. Winter Quarter, 2011 and Spring Quarter, 2013

Ph 219/CS 219. Exercises Due: Friday 3 November 2006

By allowing randomization in the verification process, we obtain a class known as MA.

CSE 599d - Quantum Computing Stabilizer Quantum Error Correcting Codes

The query register and working memory together form the accessible memory, denoted H A. Thus the state of the algorithm is described by a vector

CSC 5170: Theory of Computational Complexity Lecture 9 The Chinese University of Hong Kong 15 March 2010

Chapter 2. Basic Principles of Quantum mechanics

An Architectural Framework For Quantum Algorithms Processing Unit (QAPU)

Handout 5. α a1 a n. }, where. xi if a i = 1 1 if a i = 0.

CS 151 Complexity Theory Spring Solution Set 5

CS257 Discrete Quantum Computation

Quantum Complexity Theory and Adiabatic Computation

b) (5 points) Give a simple quantum circuit that transforms the state

Exponential algorithmic speedup by quantum walk

C/CS/Phys 191 Quantum Gates and Universality 9/22/05 Fall 2005 Lecture 8. a b b d. w. Therefore, U preserves norms and angles (up to sign).

Lecture 15: The Hidden Subgroup Problem

Shor s Prime Factorization Algorithm

The controlled-not (CNOT) gate exors the first qubit into the second qubit ( a,b. a,a + b mod 2 ). Thus it permutes the four basis states as follows:

CSCI 2570 Introduction to Nanocomputing. Discrete Quantum Computation

On the query complexity of counterfeiting quantum money

Quantum Computing. 6. Quantum Computer Architecture 7. Quantum Computers and Complexity

HMMT February 2018 February 10, 2018

Lecture Notes Each circuit agrees with M on inputs of length equal to its index, i.e. n, x {0, 1} n, C n (x) = M(x).

Lecture 11 September 30, 2015

QUANTUM COMPUTATION. Lecture notes. Ashley Montanaro, University of Bristol 1 Introduction 2

6.896 Quantum Complexity Theory September 18, Lecture 5

X row 1 X row 2, X row 2 X row 3, Z col 1 Z col 2, Z col 2 Z col 3,

Quantum Algorithms Lecture #3. Stephen Jordan

Unitary evolution: this axiom governs how the state of the quantum system evolves in time.

Lecture 7: More Arithmetic and Fun With Primes

Graph isomorphism, the hidden subgroup problem and identifying quantum states

6.896 Quantum Complexity Theory November 4th, Lecture 18

6 Cosets & Factor Groups

QLang: Qubit Language

Quantum Algorithms. 1. Definition of the Subject and Its Importance. 4. Factoring, Discrete Logarithms, and the Abelian Hidden Subgroup Problem

Richard Cleve David R. Cheriton School of Computer Science Institute for Quantum Computing University of Waterloo

arxiv:quant-ph/ v1 17 Jul 1997

Quantum Computation CMU BB, Fall Week 6 work: Oct. 11 Oct hour week Obligatory problems are marked with [ ]

Umans Complexity Theory Lectures

Lecture 23: Alternation vs. Counting

Quantum computing. Shor s factoring algorithm. Dimitri Petritis. UFR de mathématiques Université de Rennes CNRS (UMR 6625) Rennes, 30 novembre 2018

Phase estimation. p. 1/24

Lecture 6: Quantum error correction and quantum capacity

Tutorial on Quantum Computing. Vwani P. Roychowdhury. Lecture 1: Introduction

Lecture 21: Quantum communication complexity

ADVANCED QUANTUM INFORMATION THEORY

Lecture 22: Counting

Definitions. Notations. Injective, Surjective and Bijective. Divides. Cartesian Product. Relations. Equivalence Relations

Classical simulations of non-abelian quantum Fourier transforms

Notes on Complexity Theory Last updated: November, Lecture 10

1 Randomized Computation

Tensor product Take two tensors, get together enough inputs to feed into both, and take the product of their results.

Quantum-secure symmetric-key cryptography based on Hidden Shifts

Recitation 6. Randomization. 6.1 Announcements. RandomLab has been released, and is due Monday, October 2. It s worth 100 points.

Lecture 23: Introduction to Quantum Complexity Theory 1 REVIEW: CLASSICAL COMPLEXITY THEORY

Transcription:

1 Ph 219b/CS 219b Exercises Due: Wednesday 22 February 2006 6.1 Estimating the trace of a unitary matrix Recall that using an oracle that applies the conditional unitary Λ(U), Λ(U): 0 ψ 0 ψ, 1 ψ 1 U ψ (1) (where U is a unitary transformation acting on n qubits), we can measure the eigenvalues of U. If the state ψ is the eigenstate λ of U with eigenvalue λ = exp(2πiφ), then by querying the oracle k times, we can determine φ to accuracy O(1/ k). But suppose that we replace the pure state ψ in eq. (1) by the maximally mixed state of n qubits, ρ = I/2 n. a) Show that, with k queries, we can estimate both the real part and the imaginary part of tr (U) /2 n, the normalized trace of U, to accuracy O(1/ k). b) Given a polynomial-size quantum circuit, the problem of estimating to fixed accuracy the normalized trace of the unitary transformation realized by the circuit is believed to be a hard problem classically. Explain how this problem can be solved efficiently with a quantum computer. The initial state needed for each query consists of one qubit in the pure state 0 and n qubits in the maximally mixed state. Surprisingly, then, the initial state of the computer that we require to run this (apparently) powerful quantum algorithm contains only a constant number of clean qubits, and O(n) very noisy qubits. 6.2 A generalization of Simon s problem Simon s problem is a hidden subgroup problem with G = Z2 n and = Z 2 = {0,a}. Consider instead the case where = Z2 k, with generator set {a i,i=1, 2, 3,...,k}. That is, suppose an oracle evaluates

2 a function f : {0, 1} n {0, 1} n k, (2) where we are promised that f is 2 k -to-1 such that f(x) =f(x a i ) (3) for i =1, 2, 3,...,k(here denotes bitwise addition modulo 2). Since the number of cosets of in G is smaller, we can expect that the hidden subgroup is easier to find for this problem than in Simon s (k = 1) case. Find an algorithm using n k quantum queries that identifies the k generators of, and show that the success probability of the algorithm is greater than 1/4. 6.3 Query complexity of non-abelian hidden subgroup problems We have seen that there is an efficient quantum algorithm that solves the hidden subgroup problem for any finitely generated abelian group. What about non-abelian groups? The purpose of this exercise is to show that for any finite group G, the hidden subgroup problem can be solved with polylog( G ) queries to the oracle, an exponential improvement over the best classical algorithm. The oracle evaluates a function f : G X, (4) from the group G to a set X, that is constant and distinct on the cosets of a subgroup G. The problem is to identify. The input register contains at least log G qubits ( G denotes the order of G, the number of elements that it contains), and there are basis states { g,g G} that can be identified with group elements, such that g g =0forg g. We can query the oracle with a uniform superposition of all group elements, and so prepare the state 1 g f(g). (5) G g G By measuring the output register, we prepare the input register in a randomly selected coset state g, a uniform superposition of the elements of the coset: g 1 gh. (6) h

3 Distinct cosets of are disjoint, so the coset states corresponding to two distinct cosets are orthogonal. a) Note that if and are two subgroups of G, then their intersection is also a subgroup of G. Show that if the intersection of cosets g g is not empty, then it contains elements of G. b) Recall that if, then divides. Let P denote the orthogonal projection onto the linear span of the coset states { g,g G}. Show that P g 2 =. (7) Conclude that P g = g for, and that for, P g 1 2. (8) With k queries we can prepare a tensor product of randomly selected coset states ψ = g 1 g 2 g k. (9) Let P (k) P k denote the orthogonal projector onto the linear span V (k) of all such product states. Note that for, P (k) ψ 1. (10) 2k/2 Thus if the actual hidden subgroup is, and we make an orthogonal measurement M (k) that projects onto either V (k) (the positive outcome) or its orthogonal complement V (k) (the negative outcome), then we obtain the positive outcome with probability one for, and we obtain the positive outcome with probability no greater than 2 k for. We can make a list 1, 2..., R of the candidate hidden subgroups starting with the largest subgroups, such that no r on the list is a subgroup of another s for s>r; then we perform a series of tests to identify the hidden subgroup by first performing the measurement M (k) 1, then M (k) 2, continuing until a positive outcome is obtained for

4 the first time. The first for which the measurement yields a positive outcome is identified as the hidden subgroup. To check that this algorithm really works, we need to verify that the measurements that yield negative outcomes do not disturb the state ψ very much. If the actually hidden subgroup is r (the rth one listed), then the probability that the algorithm successfully identifies r is P success = P r ( I Pr 1 )( I Pr 2 ) (I P1 ) ψ 2 (11) c) Note that A ϕ A(I B) ϕ = AB ϕ B ϕ (12) for A sup 1; applying eq. (12) repeatedly r 1 times, conclude that ( P success 1 r 1 ) 2 2 k/2. (13) We see that the algorithm has constant success probability for k = O(log R), where R is the number of candidates for the hidden subgroup. In fact, since any subgroup of G can be generated by a set of at most n = log 2 G elements of G (you are not asked to prove this), and there are fewer than G n ways to choose n elements of G, the number of subgroups of G (and hence R) is less than 2 n2. Therefore O(log 2 G ) queries suffice to solve the hidden subgroup problem. owever...in contrast to the solution to the abelian hidden subgroup problem, our algorithm runs in exponential time, because we may have to perform R measurements after the queries are completed. So far, polynomial time (in log G ) algorithms that solve the hidden subgroup problem for non-abelian G are known in only a few special cases. 6.4 BQP is contained in PP We have seen that BQP (the class of decision problems that can be solved efficiently by a quantum computer) is contained in the classical complexity class PSPACE (the decision problems that can be solved using a polynomial-size memory). The purpose of this problem is to establish an inclusion that is presumed to be stronger: BQP is contained in PP. A decision problem is in PP ( probabilistic polynomial

5 time ) if it can be solved in polynomial time by a randomized classical computation with probability of success greater than 1/2. (In contrast to the class BPP, the success probability is not required to exceed 1/2 by a positive constant independent of the input size.) When a decision problem is solved by a quantum computer, one particular qubit may be designated as the answer qubit the qubit that is measured to decide the answer. If the quantum circuit builds the unitary transformation U, which acts on the input state 0, then the probability distribution governing the answer bit x can be expressed as P (x) = x, y U 0 2, (14) y where y denotes a basis state for the junk output qubits that are not measured. If the problem is in BQP, then there is a polynomialsize uniform quantum circuit family (where the circuit depends on the input to the problem) such that P (x) 2/3 when x is the correct value of the output. a) Show that if a problem is in BQP then there is a polynomial-size uniform circuit family (where the circuit depends on the input to the problem) such that 0 U 0 2 2/3 if the correct output is 0 and 0 U 0 2 < 1/3 if the correct output is 1. int: We want to avoid summing over the state of the unmeasured junk. Recall the trick we used to remove the junk produced by a reversible classical circuit. If we want to simulate on a classical computer the quantum computation that solves the problem, then, it suffices to estimate the single matrix element 0 U 0 to reasonable accuracy. Now recall that we saw in Exercise 5.3 that the quantum gate set {, Λ 2 (X)}, where denotes the adamard gate and Λ 2 (X) is the Toffoli gate, is universal for quantum computation. The Toffoli gate is classical, but the adamard gate takes the computational basis states of a qubit to superpositions of basis states: : x 1 ( 1) xy y. (15) 2 y {0,1}

6 Note that, since 2 = I, we are free to insert a pair of adamard gates acting on all qubits following each Toffoli gate, without changing anything. Suppose that U is expressed as a circuit constructed from Toffoli gates and adamard gates, where the circuit contains h adamard gates, which we label by i =0, 1, 2,...,h 1. By inserting the partition of unity I = x i {0,1} x i x i following each adamard gate, we may write the matrix element 0 U 0 as a sum of 2 h terms, with each term arising from a computational path indexed by the bit string x = x h 1 x h 2...x 1 x 0. Each term has absolute value 2 h/2, arising from the factor 2 1/2 that accompanies each adamard gate, and a phase ±1 depending on x that counts modulo 2 the number of adamard gates for which the input and output both have the value 1. Note that each output bit from every Toffoli gate, and therefore the input to each adamard gate, can be expressed as a polynomial in the {x i } that depends on the circuit. b) Show that, if U is a unitary transformation constructed from a circuit of size L, built from Toffoli and adamard gates, then there is a polynomial function φ(x) of h 2L binary variables {x h 1,x h 2,...x 1,x 0 } such that 0 U 0 = 1 2 h (N 0 N 1 ), (16) where N 0 is the number of values of x for which φ(x) = 0 (mod 2) and N 1 is the number of values of x for which φ(x) = 1 (mod 2). Furthermore, φ(x) is of degree at most three, is a sum of at most 2h monomials, and can be computed efficiently from a description of the circuit. Thus, if the circuit is polynomial size, the function φ(x) can be evaluated efficiently for any of the 2 h possible values of its input x. The difference N 0 N 1 is O( 2 h ), and we can simulate the quantum circuit (distinguishing 0 U 0 2 2/3 from 0 U 0 2 < 1/3) if we can estimate N 0 N 1 to O( 2 h ). Up until now, the computational problems we have encountered have typically involved determining whether a solution to an equation exists, exhibiting a solution, or verifying the correctness of a solution.

7 ere we have encountered a problem that appears to be intrinsically harder: counting (approximately) the number of solutions. We could attempt to do the counting by a randomized computation, evaluating φ(x) for a sample of randomly selected inputs. Unfortunately, the number of inputs mapped to 0 and to 1 are nearly in balance, which makes it hard to estimate N 0 N 1. We can think of φ(x) as a coin with an exponentially small bias; determining the basis to reasonable accuracy requires an exponentially large number of trials. But the criterion for inclusion in the class PP is weaker than that it is enough to be able to distinguish 0 U 0 2 2/3 from 0 U 0 2 < 1/3 with probability 1/2 + δ as long as δ is positive, even if it is exponentially small. This can be achieved with a polynomial number of trials. Therefore, BQP PP. The class PP is certainly contained in PSPACE, because we can determine the probability of acceptance for a randomized computation by simulating all of the possible computational paths that occur for all possible outcomes of the coin flips. There may be an exponentially large number of paths, but we can run through the paths one at a time, while maintaining a count of how many of the computations have accepted. This can be done with polynomial space.