Top Banner
Effcient quantum protocols for XOR functions Shengyu Zhang The Chinese University of Hong Kong
18

Effcient quantum protocols for XOR functions

Feb 24, 2016

Download

Documents

zohar

Effcient quantum protocols for XOR functions. Shengyu Zhang The Chinese University of Hong Kong. Communication complexity. Two parties, Alice and Bob, jointly compute a function on input . known only to Alice and only to Bob. - PowerPoint PPT Presentation
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Effcient  quantum protocols for XOR functions

Effcient quantum protocols for XOR functions

Shengyu Zhang

The Chinese University of Hong Kong

Page 2: Effcient  quantum protocols for XOR functions

Communication complexity

• Two parties, Alice and Bob, jointly compute a function on input . – known only to Alice and only to Bob.

• Communication complexity*1: how many bits are needed to be exchanged?

𝑥 𝑦

*1. A. Yao. STOC, 1979.

Page 3: Effcient  quantum protocols for XOR functions

Computation modes

• Deterministic: Players run determ. protocol. ---• Randomized: Players have access to random bits;

small error probability allowed. --- • Quantum: Players send quantum messages.– Share resource? (Superscript.)

• : share entanglement. • : share nothing

– Error? (Subscript)• : bounded-error. • : zero-error, fixed length.

Page 4: Effcient  quantum protocols for XOR functions

4

Lower bounds• Not only interesting on its own, but also important

because of numerous applications.– to prove lower bounds.

• Question: How to lower bound communication complexity itself?

• Communication matrix

𝑥→ 𝐹 (𝑥 , 𝑦 )

Page 5: Effcient  quantum protocols for XOR functions

5

Log-rank conjecture• Rank lower bound*1

• Conj: The rank lower bound is polynomially tight.• combinatorial measure linear algebra measure.• Equivalent to a bunch of other conjectures.– related to graph theory*2; nonnegative rank*3, Boolean

roots of polynomials*4, quantum sampling complexity*5.

*1. Melhorn, Schmidt. STOC, 1982. *2. Lovász, Saks. FOCS, 1988.*3. Lovász. Book Chapter, 1990.

*4. Valiant. Info. Proc. Lett., 2004.*5. Ambainis, Schulman, Ta-Shma, Vazirani, Wigderson, SICOMP 2003.

≤ log𝑂 (1 )𝑟𝑎𝑛𝑘 (𝑀𝐹 )Log Rank Conjecture*2

Page 6: Effcient  quantum protocols for XOR functions

6

Log-rank conjecture: quantum version• Rank lower bound

• Quantum: rank lower bound *1

*1. Buhrman, de Wolf. CCC, 2001.

≤ log𝑂 (1 )𝑟𝑎𝑛𝑘 (𝑀𝐹 )Log Rank Conjecture

Page 7: Effcient  quantum protocols for XOR functions

Log-rank conjecture for XOR functions

• Since Log-rank conjecture appears too hard in its full generality,…

• let’s try some special class of functions.• XOR functions: . ---– The linear composition of and .– Include important functions such as Equality,

Hamming Distance, Gap Hamming Distance.• Interesting connections to Fourier analysis of

functions on .

Page 8: Effcient  quantum protocols for XOR functions

Digression: Fourier analysis

• can be written as

– , and characters are orthogonal – : Fourier coefficients of – Parseval: If , then .

• Two important measures: – --- Spectral norm.– --- Fourier sparsity.

• Cauchy-Schwartz: for

Page 9: Effcient  quantum protocols for XOR functions

Log-rank Conj. For XOR functions

• Interesting connections to Fourier analysis:• 1. . • Log-rank Conj: • Thm.*1

• Thm.*1 .– : degree of as polynomial over .– Fact*2. .

*1. Tsang, Wong, Xie, Zhang, FOCS, 2013.*2. Bernasconi and Codenotti. IEEE Transactions on Computers, 1999.

Page 10: Effcient  quantum protocols for XOR functions

Quantum

• 2. *1

• This paper: , where .– Recall classical: – Confirms quantum Log-rank Conjecture for low-

degree XOR functions.• This talk: A simpler case .

– . *2

*1. Lee and Shraibman. Foundations and Trends in Theoretical Computer Science, 2009.*2. Buhrman and de Wolf. CCC, 2001.

Ω ( log 𝑟𝑎𝑛𝑘𝜖 (𝑀 𝑓 ∘⊕ ))≥

Page 11: Effcient  quantum protocols for XOR functions

About quantum protocol

• Much simpler.

• comes very naturally.

• Inherently quantum.– Not from quantizing any classical protocol.

Page 12: Effcient  quantum protocols for XOR functions

|𝜓 ⟩=∑𝛼∈𝐴

�̂� (𝛼 ) 𝜒 𝛼 (𝑥 )|𝐸 (𝛼 ) ⟩ |𝜓 ⟩

|𝜓 ′ ⟩=∑𝛼∈ 𝐴

�̂� (𝛼 ) 𝜒 𝛼 (𝑥 ) 𝜒 𝛼(𝑦 )|𝐸 (𝛼 ) ⟩Add phase

|𝜓 ′ ⟩

∑𝛼∈𝐴

𝑓 (𝛼 ) 𝜒𝛼 (𝑥+ 𝑦 )|𝛼 ⟩|𝐸 (𝛼 ) ⟩ →|𝛼 ⟩

Fourier:

|0 ⟩ +|1 ⟩√2

∑𝑡

|0 ⟩+ 𝑓 (𝑥+𝑦+𝑡)|1 ⟩√2

|𝑡 ⟩

Goal: compute where

Page 13: Effcient  quantum protocols for XOR functions

|𝜓 ⟩=¿+⟩ ∑𝛼∈𝐴

𝑓 (𝛼 ) 𝜒𝛼 (𝑥 )|𝐸 (𝛼 ) ⟩ |𝜓 ⟩Add phase |𝜓 ′ ⟩

Decoding + Fourier

∑𝑡

|0 ⟩+ 𝑓 (𝑥+𝑦+𝑡)|1 ⟩√2

|𝑡 ⟩

Measure Measure

A random and .Recall our target: . What’s the difference? The derivative: . Good: .Bad: .(That’s where the factor of comes from.)

• One more issue: Only Alice knows ! Bob doesn’t.

• It’s unaffordable to send .• Obs: .

Goal: compute where

Page 14: Effcient  quantum protocols for XOR functions

|𝜓 ⟩=¿+⟩ ∑𝛼∈𝐴

𝑓 (𝛼 ) 𝜒𝛼 (𝑥 )|𝐸 (𝛼 ) ⟩ |𝜓 ⟩Add phase |𝜓 ′ ⟩

Decoding + Fourier

∑𝑡

|0 ⟩+ 𝑓 (𝑥+𝑦+𝑡)|1 ⟩√2

|𝑡 ⟩

Measure Measure

A random and .Recall our target: . What’s the difference? The derivative: . Good: .Bad: .(That’s where the factor of comes from.)

• One more issue: Only Alice knows ! Bob doesn’t.

• It’s unaffordable to send .• Obs: .

𝐴

{0,1 }𝑛

Goal: compute where

Page 15: Effcient  quantum protocols for XOR functions

|𝜓 ⟩=¿+⟩ ∑𝛼∈𝐴

𝑓 (𝛼 ) 𝜒𝛼 (𝑥 )|𝐸 (𝛼 ) ⟩ |𝜓 ⟩Add phase |𝜓 ′ ⟩

Decoding + Fourier

∑𝑡

|0 ⟩+ 𝑓 (𝑥+𝑦+𝑡)|1 ⟩√2

|𝑡 ⟩

Measure Measure

A random and .Recall our target: . What’s the difference? The derivative: . Good: .Bad: .(That’s where the factor of comes from.)

• One more issue: Only Alice knows ! Bob doesn’t.

• It’s unaffordable to send .• Obs: .

• Thus in round 2, Alice and Bob can just encode the entire .

Goal: compute where

Page 16: Effcient  quantum protocols for XOR functions

|𝜓 ⟩=¿+⟩ ∑𝛼∈𝐴

𝑓 (𝛼 ) 𝜒𝛼 (𝑥 )|𝐸 (𝛼 ) ⟩ |𝜓 ⟩Add phase |𝜓 ′ ⟩

Decoding + Fourier

∑𝑡

|0 ⟩+ 𝑓 (𝑥+𝑦+𝑡)|1 ⟩√2

|𝑡 ⟩

Measure Measure

A random and .Compute .

At last, , a constant function.Cost: .

Used trivial bound:

Goal: compute where

Page 17: Effcient  quantum protocols for XOR functions

Open problems

• Get rid of the factor !

• What can we say about additive structure of for Boolean functions ? Say, ?

Page 18: Effcient  quantum protocols for XOR functions