Upper bounds for query complexity inspired by the Elitzur-Vaidman - - PowerPoint PPT Presentation

upper bounds for query complexity inspired by the elitzur
SMART_READER_LITE
LIVE PREVIEW

Upper bounds for query complexity inspired by the Elitzur-Vaidman - - PowerPoint PPT Presentation

Upper bounds for query complexity inspired by the Elitzur-Vaidman bomb tester Cedric Yen-Yu Lin, Han-Hsuan Lin Center for Theoretical Physics MIT QIP 2015 January 12, 2015 arXiv:1410.0932 Cedric Lin, Han-Hsuan Lin (MIT) Upper bounds


slide-1
SLIDE 1

Upper bounds for query complexity inspired by the Elitzur-Vaidman bomb tester

Cedric Yen-Yu Lin, Han-Hsuan Lin

Center for Theoretical Physics MIT

QIP 2015 January 12, 2015 arXiv:1410.0932

Cedric Lin, Han-Hsuan Lin (MIT) Upper bounds inspired by EV bomb tester January 12, 2015 1 / 39

slide-2
SLIDE 2

Overview

1

Bomb Query Complexity Elitzur-Vaidman bomb tester Bomb query complexity B(f) Main result: B(f) = Θ(Q(f)2)

2

Algorithms Introduction: O(N) bomb query algorithm for OR Main theorem 2: constructing q. algorithms from c. ones Applications: graph problems

3

Summary and open problems

Cedric Lin, Han-Hsuan Lin (MIT) Upper bounds inspired by EV bomb tester January 12, 2015 2 / 39

slide-3
SLIDE 3

Section 1 Bomb Query Complexity

Cedric Lin, Han-Hsuan Lin (MIT) Upper bounds inspired by EV bomb tester January 12, 2015 3 / 39

slide-4
SLIDE 4

Elitzur-Vaidman Bomb Tester [EV93]

A collection of bombs, some of which are duds Live: Explodes on contact with photon Dud: No interaction with photon Can we tell them apart without blowing ourselves up?

Cedric Lin, Han-Hsuan Lin (MIT) Upper bounds inspired by EV bomb tester January 12, 2015 4 / 39

slide-5
SLIDE 5

Elitzur-Vaidman Bomb Tester [EV93]

We can put a bomb in an Mach-Zehnder interferometer: If D2 detects a photon, then we know the bomb is live, even though it has not exploded.

Cedric Lin, Han-Hsuan Lin (MIT) Upper bounds inspired by EV bomb tester January 12, 2015 5 / 39

Image source: A. G. White et al., PRA 58, 605 (1998).

slide-6
SLIDE 6

EV bomb in circuit model

We can rewrite the Elitzur-Vaidman bomb in the circuit model:

  • |0

I or X explode if 1 Live bomb: X in the above diagram Dud: I in the above diagram

Cedric Lin, Han-Hsuan Lin (MIT) Upper bounds inspired by EV bomb tester January 12, 2015 6 / 39

slide-7
SLIDE 7

Quantum Zeno Effect [KWH+95]

Let R(θ) = exp(iθX) = cos θ − sin θ sin θ cos θ

  • .

|0 R(θ)

  • R(θ)
  • |0

I or X . . . |0 I or X π/(2θ) times in total

Cedric Lin, Han-Hsuan Lin (MIT) Upper bounds inspired by EV bomb tester January 12, 2015 7 / 39

slide-8
SLIDE 8

Quantum Zeno Effect [KWH+95]

Let R(θ) = exp(iθX) = cos θ − sin θ sin θ cos θ

  • .

|0 R(θ)

  • R(θ)
  • |1

|0 I . . . |0 I π/(2θ) times in total If dud: Ctrl-I does nothing, so |0 gets rotated to |1.

Cedric Lin, Han-Hsuan Lin (MIT) Upper bounds inspired by EV bomb tester January 12, 2015 8 / 39

slide-9
SLIDE 9

Quantum Zeno Effect [KWH+95]

Let R(θ) = exp(iθX) = cos θ − sin θ sin θ cos θ

  • .

|0 R(θ)

  • R(θ)
  • |0

|0 X . . . |0 X π/(2θ) times in total If live: First register is projected back to |0 on each measurement. Probability of explosion: Θ(θ2) × Θ(1/θ) = Θ(θ).

Cedric Lin, Han-Hsuan Lin (MIT) Upper bounds inspired by EV bomb tester January 12, 2015 9 / 39

slide-10
SLIDE 10

Quantum Zeno Effect [KWH+95]

Let R(θ) = exp(iθX) = cos θ − sin θ sin θ cos θ

  • .

|0 R(θ)

  • R(θ)
  • |0

I or X . . . |0 I or X π/(2θ) times in total Probability of explosion: Θ(θ) Number of queries: Θ(1/θ)

Cedric Lin, Han-Hsuan Lin (MIT) Upper bounds inspired by EV bomb tester January 12, 2015 10 / 39

slide-11
SLIDE 11

Quantum Query

Quantum query

|r Ox |r ⊕ xi |i |i

Cedric Lin, Han-Hsuan Lin (MIT) Upper bounds inspired by EV bomb tester January 12, 2015 11 / 39

slide-12
SLIDE 12

Quantum Query vs Bomb Query

Quantum query

|r Ox |r ⊕ xi |i |i

Bomb query

|c

  • |c

|0 Ox bomb explodes if c · xi = 1 |i |i

Cedric Lin, Han-Hsuan Lin (MIT) Upper bounds inspired by EV bomb tester January 12, 2015 11 / 39

slide-13
SLIDE 13

Bomb Query

|c

  • |c

|0 Ox bomb explodes if c · xi = 1 |i |i Differences from quantum query: Extra control register c. The record register, where we store the query result, must contain 0 as input. We must measure the query result after each query; if the result is 1, the bomb explodes and the algorithm fails.

Cedric Lin, Han-Hsuan Lin (MIT) Upper bounds inspired by EV bomb tester January 12, 2015 12 / 39

slide-14
SLIDE 14

Bomb Query

|c

  • |c

|0 Ox bomb explodes if c · xi = 1 |i |i equivalent to |c

  • |c

|i Px,0 (1 − c · xi)|i where Px,0 =

  • xi=0

|ii|, Ctrl − Px,0 = I −

  • xi=1

|1, i1, i|

Cedric Lin, Han-Hsuan Lin (MIT) Upper bounds inspired by EV bomb tester January 12, 2015 13 / 39

slide-15
SLIDE 15

Bomb Query Complexity

U0

  • U1
  • U2
  • U3

Px,0 Px,0 Px,0 . . . Call the minimum number of bomb queries needed to determine f with bounded error, with probability of explosion ≤ ǫ, the bomb query complexity Bǫ(f).

Cedric Lin, Han-Hsuan Lin (MIT) Upper bounds inspired by EV bomb tester January 12, 2015 14 / 39

slide-16
SLIDE 16

Main Theorem

Theorem

Bǫ(f) = Θ(Q(f)2/ǫ).

Upper bound: Quantum Zeno effect. Lower bound: Adversary method.

Cedric Lin, Han-Hsuan Lin (MIT) Upper bounds inspired by EV bomb tester January 12, 2015 15 / 39

slide-17
SLIDE 17

Bǫ(f) = O(Q(f)2/ǫ): Proof

We can simulate each quantum query using Θ(1/θ) bomb queries: |r X |r ⊕ xi |0 R(θ)

  • R(−θ)
  • |0 (discard)

|i Px,0 Px,0 |i repeat π/2θ times repeat π/2θ times Total probability of explosion: Θ(θ) · Q(f) = Θ(ǫ), if θ = Θ(ǫ/Q(f)). Total number of bomb queries: Θ(1/θ) · Q(f) = O(Q(f)2/ǫ).

Cedric Lin, Han-Hsuan Lin (MIT) Upper bounds inspired by EV bomb tester January 12, 2015 16 / 39

slide-18
SLIDE 18

Bǫ(f) = Ω(Q(f)2/ǫ): Proof

The proof uses the general-weight adversary method [HLS07]. We know [Rei09,Rei11,LMR+11] that the general-weight adversary bound tightly characterizes quantum query complexity: Adv±(f) = Θ(Q(f)). By modifying the proof of the general-weight adversary bound, we can show that Bǫ(f) = Ω(Adv±(f)2/ǫ). This implies that Bǫ(f) = Ω(Q(f)2/ǫ).

Cedric Lin, Han-Hsuan Lin (MIT) Upper bounds inspired by EV bomb tester January 12, 2015 17 / 39

slide-19
SLIDE 19

Section 2 Algorithms

Cedric Lin, Han-Hsuan Lin (MIT) Upper bounds inspired by EV bomb tester January 12, 2015 18 / 39

slide-20
SLIDE 20

O(N) Bomb Query Algorithm for OR

There are N bombs, want to check if any are live. Check each bomb using Θ(ǫ−1) queries, or O(N/ǫ) queries in total. Each live bomb has Θ(ǫ) chance of exploding. Each dud has no chance of exploding. Since we can stop at the first live bomb, the total chance of failure is

  • nly Θ(ǫ). Therefore Bǫ(OR) = O(N/ǫ).

Cedric Lin, Han-Hsuan Lin (MIT) Upper bounds inspired by EV bomb tester January 12, 2015 19 / 39

slide-21
SLIDE 21

Since B(OR) = O(N), Q(OR) = O( √ N). This is a nonconstructive proof of the existence of Grover’s algorithm! Can we generalize this further?

Cedric Lin, Han-Hsuan Lin (MIT) Upper bounds inspired by EV bomb tester January 12, 2015 20 / 39

slide-22
SLIDE 22

Main Theorem 2

Theorem

Suppose there is a classical randomized algorithm A that computes f(x) using at most T queries. Moreover, suppose there is an algorithm G that predicts the results of each query A makes (0 or 1), making at most an expected G mistakes. Then B(f) = O(TG), and Q(f) = O( √ TG).

Cedric Lin, Han-Hsuan Lin (MIT) Upper bounds inspired by EV bomb tester January 12, 2015 21 / 39

slide-23
SLIDE 23

Main Theorem 2

Theorem

Suppose there is a classical randomized algorithm A that computes f(x) using at most T queries. Moreover, suppose there is an algorithm G that predicts the results of each query A makes (0 or 1), making at most an expected G mistakes. Then B(f) = O(TG), and Q(f) = O( √ TG). For example, for OR we have T = N and G = 1, so Q(f) = O( √ N).

Cedric Lin, Han-Hsuan Lin (MIT) Upper bounds inspired by EV bomb tester January 12, 2015 21 / 39

slide-24
SLIDE 24

Bomb algorithm with B(f) = O(TG)

For each classical query, check whether G correctly predicts the query result of A using Θ(G/ǫ) bomb queries. If G guesses incorrectly then the probability of explosion is O(ǫ/G);

  • therwise it is zero. (This actually requires defining an equivalent

symmetric variant of the bomb query complexity.) The total probability of explosion is O(ǫ/G) · G = O(ǫ), and the number

  • f bomb queries used is O(G/ǫ) · T = O(TG/ǫ).

Cedric Lin, Han-Hsuan Lin (MIT) Upper bounds inspired by EV bomb tester January 12, 2015 22 / 39

slide-25
SLIDE 25

Explicit q. algorithm with Q(f) = O( √ TG)

Repeat until all queries of A are determined:

1

Use G to predict all remaining queries of A, under assumption it makes no mistakes.

2

Search for the location dj of first mistake, using O(

  • dj − dj−1)

quantum queries.

3

This determines the actual query results up to the dj-th query that A would have made.

Kothari’s algorithm for oracle identification [Kot14] actually already uses these steps above.

Cedric Lin, Han-Hsuan Lin (MIT) Upper bounds inspired by EV bomb tester January 12, 2015 23 / 39

slide-26
SLIDE 26

𝒋 2 5 4 3 12 7 6 9 10 𝒚𝒋 1 1 1 1 1

Explicit q. algorithm with Q(f) = O( √ TG)

Repeat until all queries of A are determined:

1

Use G to predict all remaining queries of A, under assumption it makes no mistakes.

2

Find the location dj of first mistake, using O(

  • dj − dj−1) queries to

the black box.

3

This determines the actual query results up to the dj-th query that A would have made.

Cedric Lin, Han-Hsuan Lin (MIT) Upper bounds inspired by EV bomb tester January 12, 2015 24 / 39

slide-27
SLIDE 27

𝒋 2 5 4 3 12 7 6 9 10 𝒚𝒋 1 1 1 1 1 1

Explicit q. algorithm with Q(f) = O( √ TG)

Repeat until all queries of A are determined:

1

Use G to predict all remaining queries of A, under assumption it makes no mistakes.

2

Find the location dj of first mistake, using O(

  • dj − dj−1) queries to

the black box.

3

This determines the actual query results up to the dj-th query that A would have made.

Cedric Lin, Han-Hsuan Lin (MIT) Upper bounds inspired by EV bomb tester January 12, 2015 25 / 39

slide-28
SLIDE 28

𝒋 2 5 4 3 𝒚𝒋 1 1 1

Explicit q. algorithm with Q(f) = O( √ TG)

Repeat until all queries of A are determined:

1

Use G to predict all remaining queries of A, under assumption it makes no mistakes.

2

Find the location dj of first mistake, using O(

  • dj − dj−1) queries to

the black box.

3

This determines the actual query results up to the dj-th query that A would have made.

Cedric Lin, Han-Hsuan Lin (MIT) Upper bounds inspired by EV bomb tester January 12, 2015 26 / 39

slide-29
SLIDE 29

𝒋 2 5 4 3 10 1 15 7 13 𝒚𝒋 1 1 1 1 1

Explicit q. algorithm with Q(f) = O( √ TG)

Repeat until all queries of A are determined:

1

Use G to predict all remaining queries of A, under assumption it makes no mistakes.

2

Find the location dj of first mistake, using O(

  • dj − dj−1) queries to

the black box.

3

This determines the actual query results up to the dj-th query that A would have made.

Cedric Lin, Han-Hsuan Lin (MIT) Upper bounds inspired by EV bomb tester January 12, 2015 27 / 39

slide-30
SLIDE 30

𝒋 2 5 4 3 10 1 15 7 13 𝒚𝒋 1 1 1 1 1 1

Explicit q. algorithm with Q(f) = O( √ TG)

Repeat until all queries of A are determined:

1

Use G to predict all remaining queries of A, under assumption it makes no mistakes.

2

Find the location dj of first mistake, using O(

  • dj − dj−1) queries to

the black box.

3

This determines the actual query results up to the dj-th query that A would have made.

Cedric Lin, Han-Hsuan Lin (MIT) Upper bounds inspired by EV bomb tester January 12, 2015 28 / 39

slide-31
SLIDE 31

𝒋 2 5 4 3 10 1 𝒚𝒋 1 1 1 1

Explicit q. algorithm with Q(f) = O( √ TG)

Repeat until all queries of A are determined:

1

Use G to predict all remaining queries of A, under assumption it makes no mistakes.

2

Find the location dj of first mistake, using O(

  • dj − dj−1) queries to

the black box.

3

This determines the actual query results up to the dj-th query that A would have made.

Cedric Lin, Han-Hsuan Lin (MIT) Upper bounds inspired by EV bomb tester January 12, 2015 29 / 39

slide-32
SLIDE 32

Explicit q. algorithm with Q(f) = O( √ TG)

Repeat until all queries of A are determined:

1

Use G to predict all remaining queries of A, under assumption it makes no mistakes.

2

Find the location dj of first mistake, using O(

  • dj − dj−1) queries to

the black box.

3

This determines the actual query results up to the dj-th query that A would have made.

Query complexity: O(G) · O(

  • T/G) = O(

√ TG). It looks like error reduction may give extra log factors, but [Kot14] showed that the log factors can be removed using span programs.

Cedric Lin, Han-Hsuan Lin (MIT) Upper bounds inspired by EV bomb tester January 12, 2015 30 / 39

slide-33
SLIDE 33

Applications: Breadth First Search

Problem: Unweighted Single-Source Shortest Paths

Given the adjacency matrix of an unweighted graph as a black box, find the distances from a vertex s to all other vertices. Classical algorithm: Breadth First Search.

Breadth First Search

1

Initialize an array dist that will hold the distances of the vertices from s. Set dist[s] := 0, and dist[v] := ∞ for v = s.

2

For d = 1, · · · , n − 1:

1

For all vertices v with dist[v] = d − 1, query its outgoing edges (v, w) to all vertices w whose distance we don’t know (dist[w] = ∞). If (v, w) is an edge, set dist[w] := d.

Cedric Lin, Han-Hsuan Lin (MIT) Upper bounds inspired by EV bomb tester January 12, 2015 31 / 39

slide-34
SLIDE 34

BFS: Quantum Query Complexity

Breadth First Search

1

Initialize an array dist that will hold the distances of the vertices from s. Set dist[s] := 0, and dist[v] := ∞ for v = s.

2

For d = 1, · · · , n − 1:

1

For all vertices v with dist[v] = d − 1, query its outgoing edges (v, w) to all vertices w whose distance we don’t know (dist[w] = ∞). If (v, w) is an edge, set dist[w] := d.

Worst case query complexity is T = O(n2), where n is no. of vertices. If we guess that each queried pair (v, w) is not an edge, then we make at most G = n − 1 mistakes, since each vertex is only discovered once. Q(uSSSP) = O( √ TG) = O(n3/2), matches lower bound of [DHH+04].

Cedric Lin, Han-Hsuan Lin (MIT) Upper bounds inspired by EV bomb tester January 12, 2015 32 / 39

slide-35
SLIDE 35

Applications: k-Source Shortest Paths

What if we instead want the distances from k different sources?

Problem: Unweighted k-Source Shortest Paths

Given the adjacency matrix of an unweighted graph as a black box, find the distances from vertices s1, · · · , sk to all other vertices. Classical: Run BFS k times. Quantum: G = k(n − 1), but T = O(n2) instead of O(kn2). Therefore Q(kSSP) = O(k1/2n3/2). Dhariwal and Mayar showed tight lower bound; available on S. Aaronson’s blog, Dec. 26, 2014: http://www.scottaaronson.com/blog/?p=2109

Cedric Lin, Han-Hsuan Lin (MIT) Upper bounds inspired by EV bomb tester January 12, 2015 33 / 39

slide-36
SLIDE 36

Applications: Maximum Bipartite Matching

Problem: Maximum Bipartite Matching

A matching in an undirected graph is a set of edges that do not share

  • vertices. Given a bipartite graph, find a matching with the maximum

possible number of edges. Classical algorithm: Hopcroft-Karp algorithm. Essentially proceeds by using O(√n) rounds of BFS and modified DFS (depth-first search). Quantum: G = O(√n × n) = O(n3/2), and T = O(n2) (not O(n2.5)). Therefore Q(MBM) = O(n7/4). First nontrivial upper bound!

Cedric Lin, Han-Hsuan Lin (MIT) Upper bounds inspired by EV bomb tester January 12, 2015 34 / 39

slide-37
SLIDE 37

Summary

Inspired by the EV bomb tester, we defined the notion of bomb query complexity, and showed the relation B(f) = Θ(Q(f)2). Bomb query complexity further lead us to a general construction

  • f quantum query algorithms from classical algorithms, giving us

an O(n1.75) quantum query algorithm for maximum bipartite matching.

Cedric Lin, Han-Hsuan Lin (MIT) Upper bounds inspired by EV bomb tester January 12, 2015 35 / 39

slide-38
SLIDE 38

Open Questions

Can we relate G, the number of wrong guesses, to classical measures of query complexity (e.g. certificate, sensitivity...)? Time complexity of algorithms? Algorithms for adjacency list model? Other problems e.g. matching for general graphs? Relationship between R(f) and B(f)?

Cedric Lin, Han-Hsuan Lin (MIT) Upper bounds inspired by EV bomb tester January 12, 2015 36 / 39

slide-39
SLIDE 39

Relationship between R(f) and B(f)?

For total functions the largest known separation between R(f) and Q(f) is quadratic (for the OR function). It is conjectured this is the extreme case, R(f) = O(Q(f)2). We know that B(f) = Θ(Q(f)2). Therefore the conjecture is equivalent to R(f) = O(B(f)). We give some motivation for why this conjecture might be true...

Cedric Lin, Han-Hsuan Lin (MIT) Upper bounds inspired by EV bomb tester January 12, 2015 37 / 39

slide-40
SLIDE 40

Projective Query Complexity, P(f)

Aaronson (unpublished, 2002) considered allowing access to the black box only with the following: |c

  • |c

|0 Ox c · xi |i |i We call the number of queries required the projective query complexity, P(f). Note the algorithm does not end on measuring a 1. Straightforwardly Q(f) ≤ P(f) ≤ R(f) and P(f) ≤ B(f). Regev and Schiff [RS08]: P(OR) = Ω(N). Open question: Does P(f) = Θ(R(f)) for all total functions? If this is true, implies R(f) = O(B(f)) = O(Q(f)2).

Cedric Lin, Han-Hsuan Lin (MIT) Upper bounds inspired by EV bomb tester January 12, 2015 38 / 39

slide-41
SLIDE 41

Thank You!

Cedric Lin, Han-Hsuan Lin (MIT) Upper bounds inspired by EV bomb tester January 12, 2015 39 / 39