Quantum query complexity and the adversary bound Part I: The - - PowerPoint PPT Presentation

quantum query complexity and the adversary bound part i
SMART_READER_LITE
LIVE PREVIEW

Quantum query complexity and the adversary bound Part I: The - - PowerPoint PPT Presentation

Quantum query complexity and the adversary bound Part I: The adversary bound Alexander Belov University of Latvia 22nd EWSCS, 5-10 March 2017, Palmse 1 / 36 Introduction Settings Why? Sub-question 1 Sub-question 2 Sub-question 3 Short


slide-1
SLIDE 1

1 / 36

Quantum query complexity and the adversary bound Part I: The adversary bound

Alexander Belov University of Latvia

22nd EWSCS, 5-10 March 2017, Palmse

slide-2
SLIDE 2

Introduction

Introduction Settings Why? Sub-question 1 Sub-question 2 Sub-question 3 Short outline Basic Adversary Spectral Adversary Dual Adversary Composition

2 / 36

slide-3
SLIDE 3

Settings

Introduction Settings Why? Sub-question 1 Sub-question 2 Sub-question 3 Short outline Basic Adversary Spectral Adversary Dual Adversary Composition

3 / 36

A computational problem:

f : [q]n ⊇ D → {0, 1}

A computational device (deterministic, randomised, or quantum) :

Device

  • utput
  • x1

x2 x3 . . . xn

  • Query complexity: number of queries to the input string

(worst-case) required to solve the problem.

  • Both upper and lower bounds.
slide-4
SLIDE 4

Why?

Introduction Settings Why? Sub-question 1 Sub-question 2 Sub-question 3 Short outline Basic Adversary Spectral Adversary Dual Adversary Composition

4 / 36

Why quantum query complexity?

Why quantum query complexity? Why quantum query complexity? Why quantum query complexity?

slide-5
SLIDE 5

Sub-question 1

Introduction Settings Why? Sub-question 1 Sub-question 2 Sub-question 3 Short outline Basic Adversary Spectral Adversary Dual Adversary Composition

5 / 36

Why query complexity?

Reason 1: For some problems, this is the right model.

  • In hypothesis testing, we are interested in reducing the number
  • f experiments. Experiments are expensive, computation is not

so.

  • In property testing, complexity is traditionally measured in the

number of samples.

slide-6
SLIDE 6

Sub-question 1

Introduction Settings Why? Sub-question 1 Sub-question 2 Sub-question 3 Short outline Basic Adversary Spectral Adversary Dual Adversary Composition

6 / 36

Why query complexity?

Reason 1: For some problems, this is the right model. Reason 2: Because we can.

  • We are interested in time complexity usually, but in most cases

we can only prove lower bounds by proving lower bound on query complexity.

  • In cryptography, proofs in the random oracle model are,

essentially, query complexity lower bounds.

slide-7
SLIDE 7

Sub-question 1

Introduction Settings Why? Sub-question 1 Sub-question 2 Sub-question 3 Short outline Basic Adversary Spectral Adversary Dual Adversary Composition

7 / 36

Why query complexity?

Reason 1: For some problems, this is the right model. Reason 2: Because we can. Reason 3: Query algorithm can give insights into the problem.

  • Trying to minimise query complexity of an algorithms result in
  • ur better understanding of algorithms and the problem.
  • One might hope to implement query-efficient algorithm

time-efficiently.

slide-8
SLIDE 8

Sub-question 1

Introduction Settings Why? Sub-question 1 Sub-question 2 Sub-question 3 Short outline Basic Adversary Spectral Adversary Dual Adversary Composition

8 / 36

Why query complexity?

Reason 1: For some problems, this is the right model. Reason 2: Because we can. Reason 3: Query algorithm can give insights into the problem. Reason 4: Query complexity gives impossibility results.

  • We can prove that black-box approaches are doomed.
  • We can exclude a lower bound via query complexity.
slide-9
SLIDE 9

Sub-question 2

Introduction Settings Why? Sub-question 1 Sub-question 2 Sub-question 3 Short outline Basic Adversary Spectral Adversary Dual Adversary Composition

9 / 36

Why quantum query complexity?

slide-10
SLIDE 10

Sub-question 3

Introduction Settings Why? Sub-question 1 Sub-question 2 Sub-question 3 Short outline Basic Adversary Spectral Adversary Dual Adversary Composition

10 / 36

Why quantum query complexity?

Reason 1: You do not need to understand quantum computation to study quantum query complexity.

  • Quantum query complexity is tightly characterised by a

semi-definite optimisation problem: the adversary bound.

slide-11
SLIDE 11

Sub-question 3

Introduction Settings Why? Sub-question 1 Sub-question 2 Sub-question 3 Short outline Basic Adversary Spectral Adversary Dual Adversary Composition

11 / 36

Why quantum query complexity?

Reason 1: You do not need to understand quantum computation to study quantum query complexity. Reason 2: In some sense, we understand quantum query complexity better than randomised query complexity.

  • Randomised query complexity is a collection of separated

results.

  • Quantum query complexity start resembling a theory.
slide-12
SLIDE 12

Sub-question 3

Introduction Settings Why? Sub-question 1 Sub-question 2 Sub-question 3 Short outline Basic Adversary Spectral Adversary Dual Adversary Composition

12 / 36

Why quantum query complexity?

Reason 1: You do not need to understand quantum computation to study quantum query complexity. Reason 2: In some sense, we understand quantum query complexity better than randomised query complexity. Reason 3: Quantum query complexity provides upper bound on approximate polynomial degree.

  • Approximating polynomials are used in various fields (e.g.,

learning theory)

  • One can get an approximating polynomial by constructing a

quantum query algorithm.

slide-13
SLIDE 13

Short outline

Introduction Settings Why? Sub-question 1 Sub-question 2 Sub-question 3 Short outline Basic Adversary Spectral Adversary Dual Adversary Composition

13 / 36

We are mostly considering total functions

f : [q]n → {0, 1}.

  • For such functions, one can only get a polynomial improvement

(at most 6-th power)

  • We will mostly consider sub-quadratic improvements.
slide-14
SLIDE 14

Basic Adversary

Introduction Basic Adversary Main idea Quantum Version

k-threshold function

Spectral Adversary Dual Adversary Composition

14 / 36

slide-15
SLIDE 15

Main idea

Introduction Basic Adversary Main idea Quantum Version

k-threshold function

Spectral Adversary Dual Adversary Composition

15 / 36

Distinguishing inputs

OR function:

000...00 100...00 ❱❱❱❱❱❱❱❱❱❱❱❱❱❱❱❱❱❱❱❱ 010...00◗◗◗◗◗◗◗◗◗◗◗◗◗ 001...00

❉❉❉❉❉❉❉❉

······ 000...10

q q q q q q q q q q

000...01

❥ ❥ ❥ ❥ ❥ ❥ ❥ ❥ ❥ ❥ ❥ ❥ ❥ ❥ ❥ ❥ No randomised algorithm can distinguish all these pairs of inputs in

  • (n) queries.

Hence, randomised query complexity is Ω(n).

slide-16
SLIDE 16

Quantum Version

Introduction Basic Adversary Main idea Quantum Version

k-threshold function

Spectral Adversary Dual Adversary Composition

16 / 36

000...00 100...00 ❱❱❱❱❱❱❱❱❱❱❱❱❱❱❱❱❱❱❱❱ 010...00◗◗◗◗◗◗◗◗◗◗◗◗◗ 001...00

❉❉❉❉❉❉❉❉

······ 000...10

q q q q q q q q q q

000...01

❥ ❥ ❥ ❥ ❥ ❥ ❥ ❥ ❥ ❥ ❥ ❥ ❥ ❥ ❥ ❥ Select:

X ⊆ f −1(1) Y ⊆ f −1(0)

Relation ∼ between X and Y

slide-17
SLIDE 17

Quantum Version

Introduction Basic Adversary Main idea Quantum Version

k-threshold function

Spectral Adversary Dual Adversary Composition

17 / 36

000...00 100...00 ❱❱❱❱❱❱❱❱❱❱❱❱❱❱❱❱❱❱❱❱ 010...00◗◗◗◗◗◗◗◗◗◗◗◗◗ 001...00

❉❉❉❉❉❉❉❉

······ 000...10

q q q q q q q q q q

000...01

❥ ❥ ❥ ❥ ❥ ❥ ❥ ❥ ❥ ❥ ❥ ❥ ❥ ❥ ❥ ❥ Calculate:

m : minimum, over x ∈ X, of the number of y with x ∼ y: 1 m′ : minimum, over y ∈ Y , of the number of x with x ∼ y: n ℓx,j : number of y ∈ Y such that x ∼ y and xj = yj: 1 ℓ′

y,j : number of x ∈ X such that x ∼ y and xj = yj: 1

ℓmax : maximum of ℓx,jℓ′

y,j over x ∼ y and j such that xj = yj: 1

Q(f) = Ω

  • mm′

ℓmax

  • = Ω(√n)
slide-18
SLIDE 18

k-threshold function

Introduction Basic Adversary Main idea Quantum Version

k-threshold function

Spectral Adversary Dual Adversary Composition

18 / 36

k-threshold function: f(x) = 1 if there are at least k ones in the input. X ⊆ f −1(1): x of Hamming weight k Y ⊆ f −1(0): y of Hamming weight k − 1 ∼: x ∼ y if x and y differ in 1 position x : 111 . . . 11100 . . . 00 y : 111 . . . 11000 . . . 00

slide-19
SLIDE 19

k-threshold function

Introduction Basic Adversary Main idea Quantum Version

k-threshold function

Spectral Adversary Dual Adversary Composition

19 / 36

x : 111 . . . 11100 . . . 00 y : 111 . . . 11000 . . . 00 m : minimum, over x ∈ X, of number y with x ∼ y: k m′ : minimum, over y ∈ Y , of number x with x ∼ y: n − k + 1 ℓx,j : number of y ∈ Y , such that x ∼ y and xj = yj: 1 ℓ′

y,j : number of x ∈ X, such that x ∼ y and xj = yj: 1

ℓmax : maximum of ℓx,jℓ′

y,j over x ∼ y and j such that xj = yj: 1

Q(k-threshold) = Ω

  • mm′

ℓmax

  • = Ω
  • k(n − k + 1)
  • This is tight!
slide-20
SLIDE 20

Spectral Adversary

Introduction Basic Adversary Spectral Adversary Matrix Representation Example Theorem Proof Spectral Adversary Flavours Dual Adversary Composition

20 / 36

slide-21
SLIDE 21

Matrix Representation

Introduction Basic Adversary Spectral Adversary Matrix Representation Example Theorem Proof Spectral Adversary Flavours Dual Adversary Composition

21 / 36

We had a relation x ∼ y

000 001 010 100 011

⑧ ⑧ ⑧ ⑧ ⑧ ⑧ ⑧ ⑧ ♦ ♦ ♦ ♦ ♦ ♦ ♦ ♦ ♦ ♦ ♦ ♦

101

♦ ♦ ♦ ♦ ♦ ♦ ♦ ♦ ♦ ♦ ♦ ♦

110

⑧ ⑧ ⑧ ⑧ ⑧ ⑧ ⑧ ⑧

111

Represent as a 01-matrix:

Γ = 011 101 110 111 000 001 1 1 010 1 1 100 1 1

slide-22
SLIDE 22

Matrix Representation

Introduction Basic Adversary Spectral Adversary Matrix Representation Example Theorem Proof Spectral Adversary Flavours Dual Adversary Composition

22 / 36

We had

ℓx,j : number of y ∈ Y , such that x ∼ y and xj = yj ℓ′

y,j : number of x ∈ X, such that x ∼ y and xj = yj

ℓmax : maximum of ℓx,jℓ′

y,j over x ∼ y and j such that xj = yj

Erase all entries (x, y) such that xj = yj:

Γ ◦ ∆1 = 011 101 110 111 000 001 1 010 1 100

slide-23
SLIDE 23

Matrix representation

Introduction Basic Adversary Spectral Adversary Matrix Representation Example Theorem Proof Spectral Adversary Flavours Dual Adversary Composition

23 / 36

We had

Q(f) = Ω

  • mm′

ℓmax

  • Spectral version of the adversary bound

maximise

Γ

subject to

Γ ◦ ∆j ≤ 1

for all j ∈ [n]; Where · is the spectral norm:

Γ = max

u=1,v=1 |u∗Γv|

slide-24
SLIDE 24

Example: OR function

Introduction Basic Adversary Spectral Adversary Matrix Representation Example Theorem Proof Spectral Adversary Flavours Dual Adversary Composition

24 / 36

maximise

Γ

subject to

Γ ◦ ∆j ≤ 1

for all j ∈ [n];

Γ = 00 . . . 0 10 . . . 00 1 01 . . . 00 1

. . . . . .

00 . . . 01 1 Γ ◦ ∆2 = 00 . . . 0 10 . . . 00 01 . . . 00 1

. . . . . .

00 . . . 01 Γ = √n Γ ◦ ∆j = 1

slide-25
SLIDE 25

Theorem

Introduction Basic Adversary Spectral Adversary Matrix Representation Example Theorem Proof Spectral Adversary Flavours Dual Adversary Composition

25 / 36

maximise

Γ

subject to

Γ ◦ ∆j ≤ 1

for all j ∈ [n]; implies

m : minimum, over x ∈ X, of number y with x ∼ y m′ : minimum, over y ∈ Y , of number x with x ∼ y ℓx,j : number of y ∈ Y , such that x ∼ y and xj = yj ℓ′

y,j : number of x ∈ X, such that x ∼ y and xj = yj

ℓmax : maximum of ℓx,jℓ′

y,j over x ∼ y and j such that xj = yj

Q(f) = Ω

  • mm′

ℓmax

slide-26
SLIDE 26

Proof

Introduction Basic Adversary Spectral Adversary Matrix Representation Example Theorem Proof Spectral Adversary Flavours Dual Adversary Composition

26 / 36

Lemma Assume A, B and C are real matrices such that A = B ◦ C. Then,

A ≤ max

i,j : A[ [i,j] ]=0 ri(B)cj(C),

where

ri(B) is the ℓ2-norm of the i-th row of B, and cj(C) is the ℓ2-norm of the j-th column of C.

slide-27
SLIDE 27

Spectral Adversary

Introduction Basic Adversary Spectral Adversary Matrix Representation Example Theorem Proof Spectral Adversary Flavours Dual Adversary Composition

27 / 36

maximise

Γ

subject to

Γ ◦ ∆j ≤ 1

for all j ∈ [n]; works for any matrix

Γ = 011 101 110 111 000 4.5 3.1 1.2 0.5 001 −2.1 7.8 2.5 6.9 010 9.1 −1.8 1.3 −0.2 100 −7.4 6.2 4.3 5.5 Γ ◦ ∆3 = 011 101 110 111 000 4.5 3.1 0.5 001 2.5 010 9.1 −1.8 −0.2 100 −7.4 6.2 5.5

slide-28
SLIDE 28

Flavours

Introduction Basic Adversary Spectral Adversary Matrix Representation Example Theorem Proof Spectral Adversary Flavours Dual Adversary Composition

28 / 36

Basic adversary

Γ has only 0s and 1s.

Positive-weighted adversary

Γ has only non-negative entries.

  • Combinatorial interpretation using weights and the Lemma.
  • Subject to some limitations:

certificate complexity and property testing barriers. Negative-weighted adversary

Γ is arbitrary real matrix.

  • No nice combinatorial interpretation is known.
  • It is tight!
slide-29
SLIDE 29

Dual Adversary

Introduction Basic Adversary Spectral Adversary Dual Adversary Duality PSD matrices Composition

29 / 36

slide-30
SLIDE 30

Duality

Introduction Basic Adversary Spectral Adversary Dual Adversary Duality PSD matrices Composition

30 / 36

The adversary bound maximise

Γ

subject to

Γ ◦ ∆j ≤ 1

for all j ∈ [n]; has dual formulation minimise

max

z

  • j∈[n]

Xj[ [z, z] ]

subject to

  • j:xj=yj

Xj[ [x, y] ] = 1

whenever f(x) = f(y);

Xj is a p.s.d. D × D matrix

for all j ∈ [n],

slide-31
SLIDE 31

Positive Semi-Definite Matrices

Introduction Basic Adversary Spectral Adversary Dual Adversary Duality PSD matrices Composition

31 / 36

Usual Definition: A complex matrix A is positive semi-definite iff

  • it is Hermitian: A∗ = A; and
  • all its eigenvalues are non-negative real numbers.

Procedural Definition:

  • Every matrix of the form uu∗ is PSD (rank-1).
  • Every linear combination of PSD matrices with positive

coefficients is PSD.

slide-32
SLIDE 32

Composition

Introduction Basic Adversary Spectral Adversary Dual Adversary Composition Definition Adversary Bound

32 / 36

slide-33
SLIDE 33

Definition

Introduction Basic Adversary Spectral Adversary Dual Adversary Composition Definition Adversary Bound

33 / 36

Let

f : {0, 1}n → {0, 1}

and

g: {0, 1}m → {0, 1}

be functions. Define the composed function

f◦g(x1,1, . . . , xn,m) = f

  • g(x1,1, . . . , x1,m), . . . , g(xn,1, . . . , xn,m)
  • f
  • ♦♦♦♦♦♦♦♦♦♦

g

  • x1,1

③ ③ ③ ③ ③ ③ ③

x1,2

✎✎✎✎· · ·

x1,m

❉ ❉ ❉ ❉ ❉ ❉ ❉ ⑤ ⑤ ⑤ ⑤ ⑤ ⑤ ⑤

· · ·

❖ ❖ ❖ ❖ ❖ ❖ ❖ ❖ ❖

g

  • xn,1

③ ③ ③ ③ ③ ③ ③

xn,2

✎✎✎✎· · ·

xn,m

❉ ❉ ❉ ❉ ❉ ❉ ❉

slide-34
SLIDE 34

Adversary Bound

Introduction Basic Adversary Spectral Adversary Dual Adversary Composition Definition Adversary Bound

34 / 36

We have

Adv±(f ◦ g) ≤ Adv±(f) Adv±(g)

In particular,

Q(f ◦ g) = O

  • Q(f) Q(g)
  • f
  • ♦♦♦♦♦♦♦♦♦♦

g

  • x1,1

③ ③ ③ ③ ③ ③ ③

x1,2

✎✎✎✎· · ·

x1,m

❉ ❉ ❉ ❉ ❉ ❉ ❉ ⑤ ⑤ ⑤ ⑤ ⑤ ⑤ ⑤

· · ·

❖ ❖ ❖ ❖ ❖ ❖ ❖ ❖ ❖

g

  • xn,1

③ ③ ③ ③ ③ ③ ③

xn,2

✎✎✎✎· · ·

xn,m

❉ ❉ ❉ ❉ ❉ ❉ ❉

  • We save a logarithmic factor.
  • On each composition!
slide-35
SLIDE 35

Adversary Bound

Introduction Basic Adversary Spectral Adversary Dual Adversary Composition Definition Adversary Bound

35 / 36

We also have

Adv±(f ◦ g) = Adv±(f) Adv±(g)

If f (k) is the k-th composition, then

Q(f (k)) = Θ(Adv±(f)k)

Or,

Adv±(f) = lim

k→∞

k

  • Q(f (k)).
slide-36
SLIDE 36

Introduction Basic Adversary Spectral Adversary Dual Adversary Composition Definition Adversary Bound

36 / 36

Thank you!