-
Using Azure Quantum Resource Estimator for Assessing Performance of Fault Tolerant Quantum Computation
Authors:
Wim van Dam,
Mariia Mykhailova,
Mathias Soeken
Abstract:
The resource estimation tools provided by Azure Quantum and Azure Quantum Development Kit are described. Using these tools one can automatically evaluate the logical and physical resources required to run algorithms on fault-tolerant quantum computers. An example is given of obtaining resource estimates for quantum fault-tolerant implementations of three different multiplication algorithms.
The resource estimation tools provided by Azure Quantum and Azure Quantum Development Kit are described. Using these tools one can automatically evaluate the logical and physical resources required to run algorithms on fault-tolerant quantum computers. An example is given of obtaining resource estimates for quantum fault-tolerant implementations of three different multiplication algorithms.
△ Less
Submitted 6 May, 2024; v1 submitted 9 November, 2023;
originally announced November 2023.
-
Quantum Optimization Heuristics with an Application to Knapsack Problems
Authors:
Wim van Dam,
Karim Eldefrawy,
Nicholas Genise,
Natalie Parham
Abstract:
This paper introduces two techniques that make the standard Quantum Approximate Optimization Algorithm (QAOA) more suitable for constrained optimization problems. The first technique describes how to use the outcome of a prior greedy classical algorithm to define an initial quantum state and mixing operation to adjust the quantum optimization algorithm to explore the possible answers around this i…
▽ More
This paper introduces two techniques that make the standard Quantum Approximate Optimization Algorithm (QAOA) more suitable for constrained optimization problems. The first technique describes how to use the outcome of a prior greedy classical algorithm to define an initial quantum state and mixing operation to adjust the quantum optimization algorithm to explore the possible answers around this initial greedy solution. The second technique is used to nudge the quantum exploration to avoid the local minima around the greedy solutions. To analyze the benefits of these two techniques we run the quantum algorithm on known hard instances of the Knapsack Problem using unit depth quantum circuits. The results show that the adjusted quantum optimization heuristics typically perform better than various classical heuristics.
△ Less
Submitted 3 February, 2022; v1 submitted 19 August, 2021;
originally announced August 2021.
-
Instance Independence of Single Layer Quantum Approximate Optimization Algorithm on Mixed-Spin Models at Infinite Size
Authors:
Jahan Claes,
Wim van Dam
Abstract:
This paper studies the application of the Quantum Approximate Optimization Algorithm (QAOA) to spin-glass models with random multi-body couplings in the limit of a large number of spins. We show that for such mixed-spin models the performance of depth $1$ QAOA is independent of the specific instance in the limit of infinite sized systems and we give an explicit formula for the expected performance…
▽ More
This paper studies the application of the Quantum Approximate Optimization Algorithm (QAOA) to spin-glass models with random multi-body couplings in the limit of a large number of spins. We show that for such mixed-spin models the performance of depth $1$ QAOA is independent of the specific instance in the limit of infinite sized systems and we give an explicit formula for the expected performance. We also give explicit expressions for the higher moments of the expected energy, thereby proving that the expected performance of QAOA concentrates.
△ Less
Submitted 7 September, 2021; v1 submitted 23 February, 2021;
originally announced February 2021.
-
Expectation Values from the Single-Layer Quantum Approximate Optimization Algorithm on Ising Problems
Authors:
Asier Ozaeta,
Wim van Dam,
Peter L. McMahon
Abstract:
We report on the energy-expectation-value landscapes produced by the single-layer ($p=1$) Quantum Approximate Optimization Algorithm (QAOA) when being used to solve Ising problems. The landscapes are obtained using an analytical formula that we derive. The formula allows us to predict the landscape for any given Ising problem instance and consequently predict the optimal QAOA parameters for heuris…
▽ More
We report on the energy-expectation-value landscapes produced by the single-layer ($p=1$) Quantum Approximate Optimization Algorithm (QAOA) when being used to solve Ising problems. The landscapes are obtained using an analytical formula that we derive. The formula allows us to predict the landscape for any given Ising problem instance and consequently predict the optimal QAOA parameters for heuristically solving that instance using the single-layer QAOA. We have validated our analytical formula by showing that it accurately reproduces the landscapes published in recent experimental reports. We then applied our methods to address the question: how well is the single-layer QAOA able to solve large benchmark problem instances? We used our analytical formula to calculate the optimal energy-expectation values for benchmark MAX-CUT problems containing up to $7\,000$ vertices and $41\,459$ edges. We also calculated the optimal energy expectations for general Ising problems with up to $100\,000$ vertices and $150\,000$ edges. Our results provide an estimate for how well the single-layer QAOA may work when run on a quantum computer with thousands of qubits. In addition to providing performance estimates when optimal angles are used, we are able to use our analytical results to investigate the difficulties one may encounter when running the QAOA in practice for different classes of Ising instances. We find that depending on the parameters of the Ising Hamiltonian, the expectation-value landscapes can be rather complex, with sharp features that necessitate highly accurate rotation gates in order for the QAOA to be run optimally on quantum hardware. We also present analytical results that explain some of the qualitative landscape features that are observed numerically.
△ Less
Submitted 23 September, 2022; v1 submitted 6 December, 2020;
originally announced December 2020.
-
Prospects and challenges of quantum finance
Authors:
Adam Bouland,
Wim van Dam,
Hamed Joorati,
Iordanis Kerenidis,
Anupam Prakash
Abstract:
Quantum computers are expected to have substantial impact on the finance industry, as they will be able to solve certain problems considerably faster than the best known classical algorithms. In this article we describe such potential applications of quantum computing to finance, starting with the state-of-the-art and focusing in particular on recent works by the QC Ware team. We consider quantum…
▽ More
Quantum computers are expected to have substantial impact on the finance industry, as they will be able to solve certain problems considerably faster than the best known classical algorithms. In this article we describe such potential applications of quantum computing to finance, starting with the state-of-the-art and focusing in particular on recent works by the QC Ware team. We consider quantum speedups for Monte Carlo methods, portfolio optimization, and machine learning. For each application we describe the extent of quantum speedup possible and estimate the quantum resources required to achieve a practical speedup. The near-term relevance of these quantum finance algorithms varies widely across applications - some of them are heuristic algorithms designed to be amenable to near-term prototype quantum computers, while others are proven speedups which require larger-scale quantum computers to implement. We also describe powerful ways to bring these speedups closer to experimental feasibility - in particular describing lower depth algorithms for Monte Carlo methods and quantum machine learning, as well as quantum annealing heuristics for portfolio optimization. This article is targeted at financial professionals and no particular background in quantum computation is assumed.
△ Less
Submitted 12 November, 2020;
originally announced November 2020.
-
Two-Qubit Stabilizer Circuits with Recovery I: Existence
Authors:
Wim van Dam,
Raymond Wong
Abstract:
Understanding how a stabilizer circuit responds to different input is important to formulating an effective strategy for resource management. In this paper, we further investigate the many ways of using stabilizer operations to generate a single qubit output from a two-qubit state. In particular, by restricting the input to certain product states, we discover probabilistic operations capable of tr…
▽ More
Understanding how a stabilizer circuit responds to different input is important to formulating an effective strategy for resource management. In this paper, we further investigate the many ways of using stabilizer operations to generate a single qubit output from a two-qubit state. In particular, by restricting the input to certain product states, we discover probabilistic operations capable of transforming stabilizer circuit outputs back into stabilizer circuit inputs. These secondary operations are ideally suited for recovery purposes and require only one extra resource ancilla to succeed. As a result of reusing qubits in this manner, we present an alternative to the original state preparation process that can lower the overall costs of executing any two-qubit stabilizer procedure involving non-stabilizer resources.
△ Less
Submitted 16 March, 2018;
originally announced March 2018.
-
Evolution-Time Dependence in Near-Adiabatic Quantum Evolutions
Authors:
Lucas Brady,
Wim van Dam
Abstract:
We expand upon the standard quantum adiabatic theorem, examining the time-dependence of quantum evolution in the near-adiabatic limit. We examine a Hamiltonian that evolves along some fixed trajectory from $\hat{H}_0$ to $\hat{H}_1$ in a total evolution-time $τ$, and our goal is to determine how the final state of the system depends on $τ$. If the system is initialized in a non-degenerate ground s…
▽ More
We expand upon the standard quantum adiabatic theorem, examining the time-dependence of quantum evolution in the near-adiabatic limit. We examine a Hamiltonian that evolves along some fixed trajectory from $\hat{H}_0$ to $\hat{H}_1$ in a total evolution-time $τ$, and our goal is to determine how the final state of the system depends on $τ$. If the system is initialized in a non-degenerate ground state, the adiabatic theorem says that in the limit of large $τ$, the system will stay in the ground state. We examine the near-adiabatic limit where the system evolves slowly enough that most but not all of the final state is in the ground state, and we find that the probability of leaving the ground state oscillates in $τ$ with a frequency determined by the integral of the spectral gap along the trajectory of the Hamiltonian, so long as the gap is big. If the gap becomes exceedingly small, the final probability is the sum of oscillatory behavior determined by the integrals of the gap before and after the small gap. We confirm these analytic predictions with numerical evidence from barrier tunneling problems in the context of quantum adiabatic optimization.
△ Less
Submitted 3 May, 2018; v1 submitted 12 January, 2018;
originally announced January 2018.
-
Necessary Adiabatic Run Times in Quantum Optimization
Authors:
Lucas T. Brady,
Wim van Dam
Abstract:
Quantum annealing is guaranteed to find the ground state of optimization problems in the adiabatic limit. Recent work [Phys. Rev. X 6, 031010 (2016)] has found that for some barrier tunneling problems, quantum annealing can be run much faster than is adiabatically required. Specifically, an $n$-qubit optimization problem was presented for which a non-adiabatic, or diabatic, annealing algorithm req…
▽ More
Quantum annealing is guaranteed to find the ground state of optimization problems in the adiabatic limit. Recent work [Phys. Rev. X 6, 031010 (2016)] has found that for some barrier tunneling problems, quantum annealing can be run much faster than is adiabatically required. Specifically, an $n$-qubit optimization problem was presented for which a non-adiabatic, or diabatic, annealing algorithm requires only constant runtime, while an adiabatic annealing algorithm requires a runtime polynomial in $n$.
Here we show that this non-adiabatic speed-up is a direct result of a specific symmetry in the studied problems. In the more general case, no such non-adiabatic speed-up occurs. We furthermore show why the special case achieves this speed-up compared to the general case. We conclude with the observation that the adiabatic annealing algorithm has a necessary and sufficient runtime that is quadratically better than the standard quantum adiabatic condition suggests.
△ Less
Submitted 3 February, 2017; v1 submitted 8 November, 2016;
originally announced November 2016.
-
Discrepancies between Asymptotic and Exact Spectral Gap Analyses of Quantum Adiabatic Barrier Tunneling
Authors:
Lucas T. Brady,
Wim van Dam
Abstract:
We study the asymptotic behavior of the spectral gap of simple barrier tunneling problems, which are related to using quantum annealing to find the global optimum of cost functions defined over n bits. Specifically we look at the problem of having an n qubit system tunnel through a barrier of width and height proportional to n^a. We show that with these quantum annealing problems, the asymptotic,…
▽ More
We study the asymptotic behavior of the spectral gap of simple barrier tunneling problems, which are related to using quantum annealing to find the global optimum of cost functions defined over n bits. Specifically we look at the problem of having an n qubit system tunnel through a barrier of width and height proportional to n^a. We show that with these quantum annealing problems, the asymptotic, $n\to\infty$, behavior of the spectral gap does not accurately describe the behavior of the gap at finite n until extremely large values of n (n>10^{12}). We prove that this deficiency of the asymptotic expression is a feature of simple one-dimensional tunneling problems themselves, casting doubt on whether asymptotic analysis is an appropriate tool for studying tunneling problems in quantum annealing for reasonably sized systems.
△ Less
Submitted 28 September, 2016;
originally announced September 2016.
-
Spectral Gap Analysis for Efficient Tunneling in Quantum Adiabatic Optimization
Authors:
Lucas T. Brady,
Wim van Dam
Abstract:
We investigate the efficiency of Quantum Adiabatic Optimization when overcoming potential barriers to get from a local to a global minimum. Specifically we look at n qubit systems with symmetric cost functions f:{0, 1}^n->R where the ground state must tunnel through a potential barrier of width n^a and height n^b. By the quantum adiabatic theorem the time delay sufficient to ensure tunneling grows…
▽ More
We investigate the efficiency of Quantum Adiabatic Optimization when overcoming potential barriers to get from a local to a global minimum. Specifically we look at n qubit systems with symmetric cost functions f:{0, 1}^n->R where the ground state must tunnel through a potential barrier of width n^a and height n^b. By the quantum adiabatic theorem the time delay sufficient to ensure tunneling grows quadratically with the inverse spectral gap during this tunneling process. We analyze barrier sizes with 1/2 < a + b and a < 1/2 and show that the minimum gap scales polynomially as n^{1/2-a-b} when 2a+b < 1 and exponentially as n^{-b/2} exp(-C n^{(2a+b-1)/2} ) when 1 < 2a+b. Our proof uses elementary techniques and confirms and extends an unpublished folklore result by Goldstone, which used large spin and instanton methods. Parts of our result also refine recent results by Kong and Crosson and Jiang et al. about the exponential gap scaling.
△ Less
Submitted 14 June, 2016; v1 submitted 7 January, 2016;
originally announced January 2016.
-
Optimal quantum algorithm for polynomial interpolation
Authors:
Andrew M. Childs,
Wim van Dam,
Shih-Han Hung,
Igor E. Shparlinski
Abstract:
We consider the number of quantum queries required to determine the coefficients of a degree-d polynomial over GF(q). A lower bound shown independently by Kane and Kutin and by Meyer and Pommersheim shows that d/2+1/2 quantum queries are needed to solve this problem with bounded error, whereas an algorithm of Boneh and Zhandry shows that d quantum queries are sufficient. We show that the lower bou…
▽ More
We consider the number of quantum queries required to determine the coefficients of a degree-d polynomial over GF(q). A lower bound shown independently by Kane and Kutin and by Meyer and Pommersheim shows that d/2+1/2 quantum queries are needed to solve this problem with bounded error, whereas an algorithm of Boneh and Zhandry shows that d quantum queries are sufficient. We show that the lower bound is achievable: d/2+1/2 quantum queries suffice to determine the polynomial with bounded error. Furthermore, we show that d/2+1 queries suffice to achieve probability approaching 1 for large q. These upper bounds improve results of Boneh and Zhandry on the insecurity of cryptographic protocols against quantum attacks. We also show that our algorithm's success probability as a function of the number of queries is precisely optimal. Furthermore, the algorithm can be implemented with gate complexity poly(log q) with negligible decrease in the success probability. We end with a conjecture about the quantum query complexity of multivariate polynomial interpolation.
△ Less
Submitted 1 March, 2016; v1 submitted 30 September, 2015;
originally announced September 2015.
-
Quantum Monte Carlo Simulations of Tunneling in Quantum Adiabatic Optimization
Authors:
Lucas T. Brady,
Wim van Dam
Abstract:
We explore to what extent path-integral quantum Monte Carlo methods can efficiently simulate the tunneling behavior of quantum adiabatic optimization algorithms. Specifically we look at symmetric cost functions defined over n bits with a single potential barrier that a successful optimization algorithm will have to tunnel through. The height and width of this barrier depend on n, and by tuning the…
▽ More
We explore to what extent path-integral quantum Monte Carlo methods can efficiently simulate the tunneling behavior of quantum adiabatic optimization algorithms. Specifically we look at symmetric cost functions defined over n bits with a single potential barrier that a successful optimization algorithm will have to tunnel through. The height and width of this barrier depend on n, and by tuning these dependencies, we can make the optimization algorithm succeed or fail in polynomial time. In this article we compare the strength of quantum adiabatic tunneling with that of path-integral quantum Monte Carlo methods. We find numerical evidence that quantum Monte Carlo algorithms will succeed in the same regimes where quantum adiabatic optimization succeeds.
△ Less
Submitted 17 September, 2015; v1 submitted 8 September, 2015;
originally announced September 2015.
-
Minimum Energy-Surface Required by Quantum Memory Devices
Authors:
Wim van Dam,
Hieu D. Nguyen
Abstract:
We address the question what physical resources are required and sufficient to store classical information. While there is no lower bound on the required energy or space to store information, we find that there is a nonzero lower bound for the product (P = <E> <r^2>) of these two resources. Specifically, we prove that any physical system of mass m and d degrees of freedom that stores S bits of inf…
▽ More
We address the question what physical resources are required and sufficient to store classical information. While there is no lower bound on the required energy or space to store information, we find that there is a nonzero lower bound for the product (P = <E> <r^2>) of these two resources. Specifically, we prove that any physical system of mass m and d degrees of freedom that stores S bits of information will have lower bound on the product P that is proportional to d^2/m (exp(S/d)-1)^2. This result is obtained in a non-relativistic, quantum mechanical setting and it is independent from earlier thermodynamical results such as the Bekenstein bound on the entropy of black holes.
△ Less
Submitted 15 December, 2012;
originally announced December 2012.
-
Quantum algorithms for problems in number theory, algebraic geometry, and group theory
Authors:
Wim van Dam,
Yoshitaka Sasaki
Abstract:
Quantum computers can execute algorithms that sometimes dramatically outperform classical computation. Undoubtedly the best-known example of this is Shor's discovery of an efficient quantum algorithm for factoring integers, whereas the same problem appears to be intractable on classical computers. Understanding what other computational problems can be solved significantly faster using quantum algo…
▽ More
Quantum computers can execute algorithms that sometimes dramatically outperform classical computation. Undoubtedly the best-known example of this is Shor's discovery of an efficient quantum algorithm for factoring integers, whereas the same problem appears to be intractable on classical computers. Understanding what other computational problems can be solved significantly faster using quantum algorithms is one of the major challenges in the theory of quantum computation, and such algorithms motivate the formidable task of building a large-scale quantum computer. This article will review the current state of quantum algorithms, focusing on algorithms for problems with an algebraic flavor that achieve an apparent superpolynomial speedup over classical computation.
△ Less
Submitted 26 June, 2012;
originally announced June 2012.
-
Decoherent histories of quantum searching
Authors:
Wim van Dam,
Hieu D. Nguyen
Abstract:
The theory of decoherent histories is an attempt to derive classical physics from positing only quantum laws at the fundamental level without notions of a classical apparatus or collapse of the wave-function. Searching for a marked target in a list of N items requires Ω(N) oracle queries when using a classical computer, while a quantum computer can accomplish the same task in O{\sqrt{N}} queries u…
▽ More
The theory of decoherent histories is an attempt to derive classical physics from positing only quantum laws at the fundamental level without notions of a classical apparatus or collapse of the wave-function. Searching for a marked target in a list of N items requires Ω(N) oracle queries when using a classical computer, while a quantum computer can accomplish the same task in O{\sqrt{N}} queries using Grover's quantum algorithm. We study a closed quantum system executing Grover algorithm in the framework of decoherent histories and find it to be an exactly solvable model, thus yielding an alternate derivation of Grover's famous result. We also subject the Grover-executing computer to a generic external influence without needing to know the specifics of the Hamiltonian insofar as the histories decohere. Depending on the amount of decoherence, which is captured in our model by a single parameter related to the amount of information obtained by the environment, the search time can range from quantum to classical. Thus, we identify a key effect induced by the environment that can adversely affect a quantum computer's performance and demonstrate exactly how classical computing can emerge from quantum laws.
△ Less
Submitted 7 August, 2013; v1 submitted 9 June, 2012;
originally announced June 2012.
-
Mutually unbiased bases for quantum states defined over p-adic numbers
Authors:
Wim van Dam,
Alexander Russell
Abstract:
We describe sets of mutually unbiased bases (MUBs) for quantum states defined over the p-adic numbers Q_p, i.e. the states that can be described as elements of the (rigged) Hilbert space L2(Q_p). We find that for every prime p>2 there are at least p+1 MUBs, which is in contrast with the situation for quantum states defined over the real line R for which only 3 MUBs are known.
We comment on the p…
▽ More
We describe sets of mutually unbiased bases (MUBs) for quantum states defined over the p-adic numbers Q_p, i.e. the states that can be described as elements of the (rigged) Hilbert space L2(Q_p). We find that for every prime p>2 there are at least p+1 MUBs, which is in contrast with the situation for quantum states defined over the real line R for which only 3 MUBs are known.
We comment on the possible reason for the difference regarding MUBs between these two infinite dimensional Hilbert spaces.
△ Less
Submitted 31 August, 2011;
originally announced September 2011.
-
Bipartite entangled stabilizer mutually unbiased bases as maximum cliques of Cayley graphs
Authors:
Wim van Dam,
Mark Howard
Abstract:
We examine the existence and structure of particular sets of mutually unbiased bases (MUBs) in bipartite qudit systems. In contrast to well-known power-of-prime MUB constructions, we restrict ourselves to using maximally entangled stabilizer states as MUB vectors. Consequently, these bipartite entangled stabilizer MUBs (BES MUBs) provide no local information, but are sufficient and minimal for dec…
▽ More
We examine the existence and structure of particular sets of mutually unbiased bases (MUBs) in bipartite qudit systems. In contrast to well-known power-of-prime MUB constructions, we restrict ourselves to using maximally entangled stabilizer states as MUB vectors. Consequently, these bipartite entangled stabilizer MUBs (BES MUBs) provide no local information, but are sufficient and minimal for decomposing a wide variety of interesting operators including (mixtures of) Jamiolkowski states, entanglement witnesses and more. The problem of finding such BES MUBs can be mapped, in a natural way, to that of finding maximum cliques in a family of Cayley graphs. Some relationships with known power-of-prime MUB constructions are discussed, and observables for BES MUBs are given explicitly in terms of Pauli operators.
△ Less
Submitted 5 April, 2011;
originally announced April 2011.
-
Noise Thresholds for Higher Dimensional Systems using the Discrete Wigner Function
Authors:
Wim van Dam,
Mark Howard
Abstract:
For a quantum computer acting on d-dimensional systems, we analyze the computational power of circuits wherein stabilizer operations are perfect and we allow access to imperfect non-stabilizer states or operations. If the noise rate affecting the non-stabilizer resource is sufficiently high, then these states and operations can become simulable in the sense of the Gottesman-Knill theorem, reducing…
▽ More
For a quantum computer acting on d-dimensional systems, we analyze the computational power of circuits wherein stabilizer operations are perfect and we allow access to imperfect non-stabilizer states or operations. If the noise rate affecting the non-stabilizer resource is sufficiently high, then these states and operations can become simulable in the sense of the Gottesman-Knill theorem, reducing the overall power of the circuit to no better than classical. In this paper we find the depolarizing noise rate at which this happens, and consequently the most robust non-stabilizer states and non-Clifford gates. In doing so, we make use of the discrete Wigner function and derive facets of the so-called qudit Clifford polytope i.e. the inequalities defining the convex hull of all qudit Clifford gates. Our results for robust states are provably optimal. For robust gates we find a critical noise rate that, as dimension increases, rapidly approaches the the theoretical optimum of 100%. Some connections with the question of qudit magic state distillation are discussed.
△ Less
Submitted 17 March, 2011; v1 submitted 10 November, 2010;
originally announced November 2010.
-
Quantum Online Memory Checking
Authors:
Wim van Dam,
Qingqing Yuan
Abstract:
The problem of memory checking considers storing files on an unreliable public server whose memory can be modified by a malicious party. The main task is to design an online memory checker with the capability to verify that the information on the server has not been corrupted. To store n bits of public information, the memory checker has s private reliable bits for verification purpose; while to…
▽ More
The problem of memory checking considers storing files on an unreliable public server whose memory can be modified by a malicious party. The main task is to design an online memory checker with the capability to verify that the information on the server has not been corrupted. To store n bits of public information, the memory checker has s private reliable bits for verification purpose; while to retrieve each bit of public information the checker communicates t bits with the public memory. Earlier work showed that, for classical memory checkers, the lower bound s*t \in Omega(n) holds. In this article we study quantum memory checkers that have s private qubits and that are allowed to quantum query the public memory using t qubits. We prove an exponential improvement over the classical setting by showing the existence of a quantum checker that, using quantum fingerprints, requires only s \in O(log n) qubits of local memory and t \in O(polylog n) qubits of communication with the public memory.
△ Less
Submitted 15 February, 2010;
originally announced February 2010.
-
Tight Noise Thresholds for Quantum Computation with Perfect Stabilizer Operations
Authors:
Wim van Dam,
Mark Howard
Abstract:
We study how much noise can be tolerated by a universal gate set before it loses its quantum-computational power. Specifically we look at circuits with perfect stabilizer operations in addition to imperfect non-stabilizer gates. We prove that for all unitary single-qubit gates there exists a tight depolarizing noise threshold that determines whether the gate enables universal quantum computation…
▽ More
We study how much noise can be tolerated by a universal gate set before it loses its quantum-computational power. Specifically we look at circuits with perfect stabilizer operations in addition to imperfect non-stabilizer gates. We prove that for all unitary single-qubit gates there exists a tight depolarizing noise threshold that determines whether the gate enables universal quantum computation or if the gate can be simulated by a mixture of Clifford gates. This exact threshold is determined by the Clifford polytope spanned by the 24 single-qubit Clifford gates. The result is in contrast to the situation wherein non-stabilizer qubit states are used; the thresholds in that case are not currently known to be tight.
△ Less
Submitted 20 July, 2009;
originally announced July 2009.
-
Quantum algorithms for algebraic problems
Authors:
Andrew M. Childs,
Wim van Dam
Abstract:
Quantum computers can execute algorithms that dramatically outperform classical computation. As the best-known example, Shor discovered an efficient quantum algorithm for factoring integers, whereas factoring appears to be difficult for classical computers. Understanding what other computational problems can be solved significantly faster using quantum algorithms is one of the major challenges i…
▽ More
Quantum computers can execute algorithms that dramatically outperform classical computation. As the best-known example, Shor discovered an efficient quantum algorithm for factoring integers, whereas factoring appears to be difficult for classical computers. Understanding what other computational problems can be solved significantly faster using quantum algorithms is one of the major challenges in the theory of quantum computation, and such algorithms motivate the formidable task of building a large-scale quantum computer. This article reviews the current state of quantum algorithms, focusing on algorithms with superpolynomial speedup over classical computation, and in particular, on problems with an algebraic flavor.
△ Less
Submitted 2 December, 2008;
originally announced December 2008.
-
Classical and Quantum Algorithms for Exponential Congruences
Authors:
Wim van Dam,
Igor E. Shparlinski
Abstract:
We discuss classical and quantum algorithms for solvability testing and finding integer solutions x,y of equations of the form af^x + bg^y = c over finite fields GF(q). A quantum algorithm with time complexity q^(3/8) (log q)^O(1) is presented. While still superpolynomial in log q, this quantum algorithm is significantly faster than the best known classical algorithm, which has time complexity q…
▽ More
We discuss classical and quantum algorithms for solvability testing and finding integer solutions x,y of equations of the form af^x + bg^y = c over finite fields GF(q). A quantum algorithm with time complexity q^(3/8) (log q)^O(1) is presented. While still superpolynomial in log q, this quantum algorithm is significantly faster than the best known classical algorithm, which has time complexity q^(9/8) (log q)^O(1). Thus it gives an example of a natural problem where quantum algorithms provide about a cubic speed-up over classical ones.
△ Less
Submitted 7 April, 2008;
originally announced April 2008.
-
Optimal phase estimation in quantum networks
Authors:
Wim van Dam,
G. Mauro D'Ariano,
Artur Ekert,
Chiara Macchiavello,
Michele Mosca
Abstract:
We address the problem of estimating the phase phi given N copies of the phase rotation u(phi) within an array of quantum operations in finite dimensions. We first consider the special case where the array consists of an arbitrary input state followed by any arrangement of the N phase rotations, and ending with a POVM. We optimise the POVM for a given input state and fixed arrangement. Then we a…
▽ More
We address the problem of estimating the phase phi given N copies of the phase rotation u(phi) within an array of quantum operations in finite dimensions. We first consider the special case where the array consists of an arbitrary input state followed by any arrangement of the N phase rotations, and ending with a POVM. We optimise the POVM for a given input state and fixed arrangement. Then we also optimise the input state for some specific cost functions. In all cases, the optimal POVM is equivalent to a quantum Fourier transform in an appropriate basis. Examples and applications are given.
△ Less
Submitted 15 August, 2007; v1 submitted 29 June, 2007;
originally announced June 2007.
-
Optimal quantum circuits for general phase estimation
Authors:
W. van Dam,
G. M. D'Ariano,
A. Ekert,
C. Macchiavello,
M. Mosca
Abstract:
We address the problem of estimating the phase phi given N copies of the phase rotation gate u(phi). We consider, for the first time, the optimization of the general case where the circuit consists of an arbitrary input state, followed by any arrangement of the N phase rotations interspersed with arbitrary quantum operations, and ending with a POVM. Using the polynomial method, we show that, in…
▽ More
We address the problem of estimating the phase phi given N copies of the phase rotation gate u(phi). We consider, for the first time, the optimization of the general case where the circuit consists of an arbitrary input state, followed by any arrangement of the N phase rotations interspersed with arbitrary quantum operations, and ending with a POVM. Using the polynomial method, we show that, in all cases where the measure of quality of the estimate phi' for phi depends only on the difference phi'-phi, the optimal scheme has a very simple fixed form. This implies that an optimal general phase estimation procedure can be found by just optimizing the amplitudes of the initial state.
△ Less
Submitted 20 September, 2006;
originally announced September 2006.
-
Quantum algorithm for a generalized hidden shift problem
Authors:
Andrew M. Childs,
Wim van Dam
Abstract:
Consider the following generalized hidden shift problem: given a function f on {0,...,M-1} x Z_N satisfying f(b,x)=f(b+1,x+s) for b=0,1,...,M-2, find the unknown shift s in Z_N. For M=N, this problem is an instance of the abelian hidden subgroup problem, which can be solved efficiently on a quantum computer, whereas for M=2, it is equivalent to the dihedral hidden subgroup problem, for which no…
▽ More
Consider the following generalized hidden shift problem: given a function f on {0,...,M-1} x Z_N satisfying f(b,x)=f(b+1,x+s) for b=0,1,...,M-2, find the unknown shift s in Z_N. For M=N, this problem is an instance of the abelian hidden subgroup problem, which can be solved efficiently on a quantum computer, whereas for M=2, it is equivalent to the dihedral hidden subgroup problem, for which no efficient algorithm is known. For any fixed positive epsilon, we give an efficient (i.e., poly(log N)) quantum algorithm for this problem provided M > N^epsilon. The algorithm is based on the "pretty good measurement" and uses H. Lenstra's (classical) algorithm for integer programming as a subroutine.
△ Less
Submitted 19 July, 2005;
originally announced July 2005.
-
From optimal measurement to efficient quantum algorithms for the hidden subgroup problem over semidirect product groups
Authors:
Dave Bacon,
Andrew M. Childs,
Wim van Dam
Abstract:
We approach the hidden subgroup problem by performing the so-called pretty good measurement on hidden subgroup states. For various groups that can be expressed as the semidirect product of an abelian group and a cyclic group, we show that the pretty good measurement is optimal and that its probability of success and unitary implementation are closely related to an average-case algebraic problem.…
▽ More
We approach the hidden subgroup problem by performing the so-called pretty good measurement on hidden subgroup states. For various groups that can be expressed as the semidirect product of an abelian group and a cyclic group, we show that the pretty good measurement is optimal and that its probability of success and unitary implementation are closely related to an average-case algebraic problem. By solving this problem, we find efficient quantum algorithms for a number of nonabelian hidden subgroup problems, including some for which no efficient algorithm was previously known: certain metacyclic groups as well as all groups of the form (Z_p)^r X| Z_p for fixed r (including the Heisenberg group, r=2). In particular, our results show that entangled measurements across multiple copies of hidden subgroup states can be useful for efficiently solving the nonabelian HSP.
△ Less
Submitted 26 April, 2005; v1 submitted 11 April, 2005;
originally announced April 2005.
-
Implausible Consequences of Superstrong Nonlocality
Authors:
Wim van Dam
Abstract:
This Letter looks at the consequences of so-called 'superstrong nonlocal correlations', which are hypothetical violations of Bell/CHSH inequalities that are stronger than quantum mechanics allows, yet weak enough to prohibit faster-than-light communication. It is shown that the existence of maximally superstrong correlated bits implies that all distributed computations can be performed with a tr…
▽ More
This Letter looks at the consequences of so-called 'superstrong nonlocal correlations', which are hypothetical violations of Bell/CHSH inequalities that are stronger than quantum mechanics allows, yet weak enough to prohibit faster-than-light communication. It is shown that the existence of maximally superstrong correlated bits implies that all distributed computations can be performed with a trivial amount of communication, i.e. with one bit. If one believes that Nature does not allow such a computational 'free lunch', then the result in the Letter gives a reason why superstrong correlation are indeed not possible.
△ Less
Submitted 27 January, 2005;
originally announced January 2005.
-
Optimal measurements for the dihedral hidden subgroup problem
Authors:
Dave Bacon,
Andrew M. Childs,
Wim van Dam
Abstract:
We consider the dihedral hidden subgroup problem as the problem of distinguishing hidden subgroup states. We show that the optimal measurement for solving this problem is the so-called pretty good measurement. We then prove that the success probability of this measurement exhibits a sharp threshold as a function of the density nu=k/log N, where k is the number of copies of the hidden subgroup st…
▽ More
We consider the dihedral hidden subgroup problem as the problem of distinguishing hidden subgroup states. We show that the optimal measurement for solving this problem is the so-called pretty good measurement. We then prove that the success probability of this measurement exhibits a sharp threshold as a function of the density nu=k/log N, where k is the number of copies of the hidden subgroup state and 2N is the order of the dihedral group. In particular, for nu<1 the optimal measurement (and hence any measurement) identifies the hidden subgroup with a probability that is exponentially small in log N, while for nu>1 the optimal measurement identifies the hidden subgroup with a probability of order unity. Thus the dihedral group provides an example of a group G for which Omega(log|G|) hidden subgroup states are necessary to solve the hidden subgroup problem. We also consider the optimal measurement for determining a single bit of the answer, and show that it exhibits the same threshold. Finally, we consider implementing the optimal measurement by a quantum circuit, and thereby establish further connections between the dihedral hidden subgroup problem and average case subset sum problems. In particular, we show that an efficient quantum algorithm for a restricted version of the optimal measurement would imply an efficient quantum algorithm for the subset sum problem, and conversely, that the ability to quantum sample from subset sum solutions allows one to implement the optimal measurement.
△ Less
Submitted 26 April, 2005; v1 submitted 10 January, 2005;
originally announced January 2005.
-
Adiabatic Quantum Computation is Equivalent to Standard Quantum Computation
Authors:
Dorit Aharonov,
Wim van Dam,
Julia Kempe,
Zeph Landau,
Seth Lloyd,
Oded Regev
Abstract:
Adiabatic quantum computation has recently attracted attention in the physics and computer science communities, but its computational power was unknown. We describe an efficient adiabatic simulation of any given quantum algorithm, which implies that the adiabatic computation model and the conventional quantum computation model are polynomially equivalent. Our result can be extended to the physic…
▽ More
Adiabatic quantum computation has recently attracted attention in the physics and computer science communities, but its computational power was unknown. We describe an efficient adiabatic simulation of any given quantum algorithm, which implies that the adiabatic computation model and the conventional quantum computation model are polynomially equivalent. Our result can be extended to the physically realistic setting of particles arranged on a two-dimensional grid with nearest neighbor interactions. The equivalence between the models provides a new vantage point from which to tackle the central issues in quantum computation, namely designing new quantum algorithms and constructing fault tolerant quantum computers. In particular, by translating the main open questions in the area of quantum algorithms to the language of spectral gaps of sparse matrices, the result makes these questions accessible to a wider scientific audience, acquainted with mathematical physics, expander theory and rapidly mixing Markov chains.
△ Less
Submitted 26 March, 2005; v1 submitted 18 May, 2004;
originally announced May 2004.
-
Quantum Computing and Zeroes of Zeta Functions
Authors:
Wim van Dam
Abstract:
A possible connection between quantum computing and Zeta functions of finite field equations is described. Inspired by the 'spectral approach' to the Riemann conjecture, the assumption is that the zeroes of such Zeta functions correspond to the eigenvalues of finite dimensional unitary operators of natural quantum mechanical systems. The notion of universal, efficient quantum computation is used…
▽ More
A possible connection between quantum computing and Zeta functions of finite field equations is described. Inspired by the 'spectral approach' to the Riemann conjecture, the assumption is that the zeroes of such Zeta functions correspond to the eigenvalues of finite dimensional unitary operators of natural quantum mechanical systems. The notion of universal, efficient quantum computation is used to model the desired quantum systems.
Using eigenvalue estimation, such quantum circuits would be able to approximately count the number of solutions of finite field equations with an accuracy that does not appear to be feasible with a classical computer. For certain equations (Fermat hypersurfaces) it is show that one can indeed model their Zeta functions with efficient quantum algorithms, which gives some evidence in favor of the proposal of this article.
△ Less
Submitted 17 May, 2004;
originally announced May 2004.
-
Summary of Delsarte's "Nombre de Solutions des Equations Polynomiales sur un Corps Fini"
Authors:
Wim van Dam
Abstract:
An English summary is given of Jean Delsarte's article "Nombre de solutions des equations polynomiales sur un corps fini."
An English summary is given of Jean Delsarte's article "Nombre de solutions des equations polynomiales sur un corps fini."
△ Less
Submitted 8 January, 2004; v1 submitted 7 January, 2004;
originally announced January 2004.
-
Quantum Computing Discrete Logarithms with the Help of a Preprocessed State
Authors:
Wim van Dam
Abstract:
An alternative quantum algorithm for the discrete logarithm problem is presented. The algorithm uses two quantum registers and two Fourier transforms whereas Shor's algorithm requires three registers and four Fourier transforms. A crucial ingredient of the algorithm is a quantum state that needs to be constructed before we can perform the computation. After one copy of this state is created, the…
▽ More
An alternative quantum algorithm for the discrete logarithm problem is presented. The algorithm uses two quantum registers and two Fourier transforms whereas Shor's algorithm requires three registers and four Fourier transforms. A crucial ingredient of the algorithm is a quantum state that needs to be constructed before we can perform the computation. After one copy of this state is created, the algorithm can be executed arbitrarily many times.
△ Less
Submitted 20 November, 2003;
originally announced November 2003.
-
Comment on "Quantum identification schemes with entanglements"
Authors:
Wim van Dam
Abstract:
In a recent paper, [Phys. Rev. A 65, 052326 (2002)], Mihara presented several cryptographic protocols that were claimed to be quantum mechanical in nature. In this comment it is pointed out that these protocols can be described in purely classical terms. Hence, the security of these schemes does not rely on the usage of entanglement or any other quantum mechanical property.
In a recent paper, [Phys. Rev. A 65, 052326 (2002)], Mihara presented several cryptographic protocols that were claimed to be quantum mechanical in nature. In this comment it is pointed out that these protocols can be described in purely classical terms. Hence, the security of these schemes does not rely on the usage of entanglement or any other quantum mechanical property.
△ Less
Submitted 17 July, 2003;
originally announced July 2003.
-
The statistical strength of nonlocality proofs
Authors:
Wim van Dam,
Peter Grunwald,
Richard Gill
Abstract:
There exist numerous proofs of Bell's theorem, stating that quantum mechanics is incompatible with local realistic theories of nature. Here we define the strength of such nonlocality proofs in terms of the amount of evidence against local realism provided by the corresponding experiments. This measure tells us how many trials of the experiment we should perform in order to observe a substantial…
▽ More
There exist numerous proofs of Bell's theorem, stating that quantum mechanics is incompatible with local realistic theories of nature. Here we define the strength of such nonlocality proofs in terms of the amount of evidence against local realism provided by the corresponding experiments. This measure tells us how many trials of the experiment we should perform in order to observe a substantial violation of local realism. Statistical considerations show that the amount of evidence should be measured by the Kullback-Leibler or relative entropy divergence between the probability distributions over the measurement outcomes that the respective theories predict. The statistical strength of a nonlocality proof is thus determined by the experimental implementation of it that maximizes the Kullback-Leibler divergence from experimental (quantum mechanical) truth to the set of all possible local theories. An implementation includes a specification with which probabilities the different measurement settings are sampled, and hence the maximization is done over all such setting distributions.
We analyze two versions of Bell's nonlocality proof (his original proof and an optimized version by Peres), and proofs by Clauser-Horne-Shimony-Holt, Hardy, Mermin, and Greenberger-Horne-Zeilinger. We find that the GHZ proof is at least four and a half times stronger than all other proofs, while of the two-party proofs, the one of CHSH is the strongest.
△ Less
Submitted 1 June, 2004; v1 submitted 17 July, 2003;
originally announced July 2003.
-
Experimental implementation of an adiabatic quantum optimization algorithm
Authors:
Matthias Steffen,
Wim van Dam,
Tad Hogg,
Greg Breyta,
Isaac Chuang
Abstract:
We report the realization of a nuclear magnetic resonance computer with three quantum bits that simulates an adiabatic quantum optimization algorithm. Adiabatic quantum algorithms offer new insight into how quantum resources can be used to solve hard problems. This experiment uses a particularly well suited three quantum bit molecule and was made possible by introducing a technique that encodes…
▽ More
We report the realization of a nuclear magnetic resonance computer with three quantum bits that simulates an adiabatic quantum optimization algorithm. Adiabatic quantum algorithms offer new insight into how quantum resources can be used to solve hard problems. This experiment uses a particularly well suited three quantum bit molecule and was made possible by introducing a technique that encodes general instances of the given optimization problem into an easily applicable Hamiltonian. Our results indicate an optimal run time of the adiabatic algorithm that agrees well with the prediction of a simple decoherence model.
△ Less
Submitted 13 February, 2003; v1 submitted 7 February, 2003;
originally announced February 2003.
-
Quantum Algorithms for some Hidden Shift Problems
Authors:
Wim van Dam,
Sean Hallgren,
Lawrence Ip
Abstract:
Almost all of the most successful quantum algorithms discovered to date exploit the ability of the Fourier transform to recover subgroup structure of functions, especially periodicity. The fact that Fourier transforms can also be used to capture shift structure has received far less attention in the context of quantum computation.
In this paper, we present three examples of ``unknown shift'' p…
▽ More
Almost all of the most successful quantum algorithms discovered to date exploit the ability of the Fourier transform to recover subgroup structure of functions, especially periodicity. The fact that Fourier transforms can also be used to capture shift structure has received far less attention in the context of quantum computation.
In this paper, we present three examples of ``unknown shift'' problems that can be solved efficiently on a quantum computer using the quantum Fourier transform. We also define the hidden coset problem, which generalizes the hidden shift problem and the hidden subgroup problem. This framework provides a unified way of viewing the ability of the Fourier transform to capture subgroup and shift structure.
△ Less
Submitted 21 November, 2002;
originally announced November 2002.
-
Efficient Quantum Algorithms for Estimating Gauss Sums
Authors:
Wim van Dam,
Gadiel Seroussi
Abstract:
We present an efficient quantum algorithm for estimating Gauss sums over finite fields and finite rings. This is a natural problem as the description of a Gauss sum can be done without reference to a black box function. With a reduction from the discrete logarithm problem to Gauss sum estimation we also give evidence that this problem is hard for classical algorithms. The workings of the quantum…
▽ More
We present an efficient quantum algorithm for estimating Gauss sums over finite fields and finite rings. This is a natural problem as the description of a Gauss sum can be done without reference to a black box function. With a reduction from the discrete logarithm problem to Gauss sum estimation we also give evidence that this problem is hard for classical algorithms. The workings of the quantum algorithm rely on the interaction between the additive characters of the Fourier transform and the multiplicative characters of the Gauss sum.
△ Less
Submitted 22 July, 2002;
originally announced July 2002.
-
How Powerful is Adiabatic Quantum Computation?
Authors:
Wim van Dam,
Michele Mosca,
Umesh Vazirani
Abstract:
We analyze the computational power and limitations of the recently proposed 'quantum adiabatic evolution algorithm'.
We analyze the computational power and limitations of the recently proposed 'quantum adiabatic evolution algorithm'.
△ Less
Submitted 31 May, 2002;
originally announced June 2002.
-
Renyi-entropic bounds on quantum communication
Authors:
Wim van Dam,
Patrick Hayden
Abstract:
In this article we establish new bounds on the quantum communication complexity of distributed problems. Specifically, we consider the amount of communication that is required to transform a bipartite state into another, typically more entangled, state. We obtain lower bounds in this setting by studying the Renyi entropy of the marginal density matrices of the distributed system.
The communica…
▽ More
In this article we establish new bounds on the quantum communication complexity of distributed problems. Specifically, we consider the amount of communication that is required to transform a bipartite state into another, typically more entangled, state. We obtain lower bounds in this setting by studying the Renyi entropy of the marginal density matrices of the distributed system.
The communication bounds on quantum state transformations also imply lower bounds for the model of communication complexity where the task consists of the the distributed evaluation of a function f(x,y). Our approach encapsulates several known lower bound methods that use the log-rank or the von Neumann entropy of the density matrices involved. The technique is also effective for proving lower bounds on problems involving a promise or for which the "hard" distributions of inputs are correlated. As examples, we show how to prove a nearly tight bound on the bounded-error quantum communication complexity of the inner product function in the presence of unlimited amounts of EPR-type entanglement and a similarly strong bound on the complexity of the shifted quadratic character problem.
△ Less
Submitted 17 April, 2002;
originally announced April 2002.
-
Embezzling Entangled Quantum States
Authors:
Wim van Dam,
Patrick Hayden
Abstract:
We show that in the presence of arbitrary catalysts, any pure bipartite entangled state can be converted into any other to unlimited accuracy without the use of any communication, quantum or classical.
We show that in the presence of arbitrary catalysts, any pure bipartite entangled state can be converted into any other to unlimited accuracy without the use of any communication, quantum or classical.
△ Less
Submitted 10 January, 2002;
originally announced January 2002.
-
Efficient Quantum Algorithms for Shifted Quadratic Character Problems
Authors:
Wim van Dam,
Sean Hallgren
Abstract:
We introduce the Shifted Legendre Symbol Problem and some variants along with efficient quantum algorithms to solve them. The problems and their algorithms are different from previous work on quantum computation in that they do not appear to fit into the framework of the Hidden Subgroup Problem. The classical complexity of the problem is unknown despite the various results on the irregularity of…
▽ More
We introduce the Shifted Legendre Symbol Problem and some variants along with efficient quantum algorithms to solve them. The problems and their algorithms are different from previous work on quantum computation in that they do not appear to fit into the framework of the Hidden Subgroup Problem. The classical complexity of the problem is unknown despite the various results on the irregularity of Legendre Sequences.
△ Less
Submitted 4 January, 2001; v1 submitted 15 November, 2000;
originally announced November 2000.
-
Quantum Algorithms for Weighing Matrices and Quadratic Residues
Authors:
Wim van Dam
Abstract:
In this article we investigate how we can employ the structure of combinatorial objects like Hadamard matrices and weighing matrices to device new quantum algorithms. We show how the properties of a weighing matrix can be used to construct a problem for which the quantum query complexity is ignificantly lower than the classical one. It is pointed out that this scheme captures both Bernstein & Va…
▽ More
In this article we investigate how we can employ the structure of combinatorial objects like Hadamard matrices and weighing matrices to device new quantum algorithms. We show how the properties of a weighing matrix can be used to construct a problem for which the quantum query complexity is ignificantly lower than the classical one. It is pointed out that this scheme captures both Bernstein & Vazirani's inner-product protocol, as well as Grover's search algorithm.
In the second part of the article we consider Paley's construction of Hadamard matrices, which relies on the properties of quadratic characters over finite fields. We design a query problem that uses the Legendre symbol chi (which indicates if an element of a finite field F_q is a quadratic residue or not). It is shown how for a shifted Legendre function f_s(i)=chi(i+s), the unknown s in F_q can be obtained exactly with only two quantum calls to f_s. This is in sharp contrast with the observation that any classical, probabilistic procedure requires more than log(q) + log((1-e)/2) queries to solve the same problem.
△ Less
Submitted 19 March, 2001; v1 submitted 11 August, 2000;
originally announced August 2000.
-
Quantum Kolmogorov Complexity
Authors:
Andre Berthiaume,
Wim van Dam,
Sophie Laplante
Abstract:
In this paper we give a definition for quantum Kolmogorov complexity. In the classical setting, the Kolmogorov complexity of a string is the length of the shortest program that can produce this string as its output. It is a measure of the amount of innate randomness (or information) contained in the string.
We define the quantum Kolmogorov complexity of a qubit string as the length of the shor…
▽ More
In this paper we give a definition for quantum Kolmogorov complexity. In the classical setting, the Kolmogorov complexity of a string is the length of the shortest program that can produce this string as its output. It is a measure of the amount of innate randomness (or information) contained in the string.
We define the quantum Kolmogorov complexity of a qubit string as the length of the shortest quantum input to a universal quantum Turing machine that produces the initial qubit string with high fidelity. The definition of Vitanyi (Proceedings of the 15th IEEE Annual Conference on Computational Complexity, 2000) measures the amount of classical information, whereas we consider the amount of quantum information in a qubit string. We argue that our definition is natural and is an accurate representation of the amount of quantum information contained in a quantum state.
△ Less
Submitted 3 May, 2000;
originally announced May 2000.
-
Self-Testing of Universal and Fault-Tolerant Sets of Quantum Gates
Authors:
Wim van Dam,
Frederic Magniez,
Michele Mosca,
Miklos Santha
Abstract:
We consider the design of self-testers for quantum gates. A self-tester for the gates F_1,...,F_m is a classical procedure that, given any gates G_1,...,G_m, decides with high probability if each G_i is close to F_i. This decision has to rely only on measuring in the computational basis the effect of iterating the gates on the classical states. It turns out that instead of individual gates, we c…
▽ More
We consider the design of self-testers for quantum gates. A self-tester for the gates F_1,...,F_m is a classical procedure that, given any gates G_1,...,G_m, decides with high probability if each G_i is close to F_i. This decision has to rely only on measuring in the computational basis the effect of iterating the gates on the classical states. It turns out that instead of individual gates, we can only design procedures for families of gates. To achieve our goal we borrow some elegant ideas of the theory of program testing: we characterize the gate families by specific properties, we develop a theory of robustness for them, and show that they lead to self-testers. In particular we prove that the universal and fault-tolerant set of gates consisting of a Hadamard gate, a c-NOT gate, and a phase rotation gate of angle pi/4 is self-testable.
△ Less
Submitted 13 February, 2000; v1 submitted 29 April, 1999;
originally announced April 1999.
-
Quantum Bounded Query Complexity
Authors:
Harry Buhrman,
Wim van Dam
Abstract:
We combine the classical notions and techniques for bounded query classes with those developed in quantum computing. We give strong evidence that quantum queries to an oracle in the class NP does indeed reduce the query complexity of decision problems. Under traditional complexity assumptions, we obtain an exponential speedup between the quantum and the classical query complexity of function cla…
▽ More
We combine the classical notions and techniques for bounded query classes with those developed in quantum computing. We give strong evidence that quantum queries to an oracle in the class NP does indeed reduce the query complexity of decision problems. Under traditional complexity assumptions, we obtain an exponential speedup between the quantum and the classical query complexity of function classes.
For decision problems and function classes we obtain the following results: o P_||^NP[2k] is included in EQP_||^NP[k] o P_||^NP[2^(k+1)-2] is included in EQP^NP[k] o FP_||^NP[2^(k+1)-2] is included in FEQP^NP[2k] o FP_||^NP is included in FEQP^NP[O(log n)] For sets A that are many-one complete for PSPACE or EXP we show that FP^A is included in FEQP^A[1]. Sets A that are many-one complete for PP have the property that FP_||^A is included in FEQP^A[1]. In general we prove that for any set A there is a set X such that FP^A is included in FEQP^X[1], establishing that no set is superterse in the quantum setting.
△ Less
Submitted 9 March, 1999;
originally announced March 1999.
-
Two Classical Queries versus One Quantum Query
Authors:
Wim van Dam
Abstract:
In this note we study the power of so called query-limited computers. We compare the strength of a classical computer that is allowed to ask two questions to an NP-oracle with the strength of a quantum computer that is allowed only one such query. It is shown that any decision problem that requires two parallel (non-adaptive) SAT-queries on a classical computer can also be solved exactly by a qu…
▽ More
In this note we study the power of so called query-limited computers. We compare the strength of a classical computer that is allowed to ask two questions to an NP-oracle with the strength of a quantum computer that is allowed only one such query. It is shown that any decision problem that requires two parallel (non-adaptive) SAT-queries on a classical computer can also be solved exactly by a quantum computer using only one SAT-oracle call, where both computations have polynomial time-complexity. Such a simulation is generally believed to be impossible for a one-query classical computer. The reduction also does not hold if we replace the SAT-oracle by a general black-box. This result gives therefore an example of how a quantum computer is probably more powerful than a classical computer. It also highlights the potential differences between quantum complexity results for general oracles when compared to results for more structured tasks like the SAT-problem.
△ Less
Submitted 25 August, 1998; v1 submitted 26 June, 1998;
originally announced June 1998.
-
Quantum Whispers
Authors:
Lucien Hardy,
Wim van Dam
Abstract:
It is shown that with the use of entanglement a specific two party communication task can be done with a systematically smaller expected error than any possible classical protocol could do. The example utilises the very tight correlation between separate spin measurements on a singlet state for small differences in the angles of these two measurements. An extension of this example to many partie…
▽ More
It is shown that with the use of entanglement a specific two party communication task can be done with a systematically smaller expected error than any possible classical protocol could do. The example utilises the very tight correlation between separate spin measurements on a singlet state for small differences in the angles of these two measurements. An extension of this example to many parties arranged in a row with only local, one-to-one communication (whispering) is then considered. It is argued that in this scenario there exists no reliable classical protocol, whereas in the quantum case there does.
△ Less
Submitted 12 May, 1998;
originally announced May 1998.
-
Quantum Oracle Interrogation: Getting all information for almost half the price
Authors:
Wim van Dam
Abstract:
Consider a quantum computer in combination with a binary oracle of domain size N. It is shown how N/2+sqrt(N) calls to the oracle are sufficient to guess the whole content of the oracle (being an N bit string) with probability greater than 95%. This contrasts the power of classical computers which would require N calls to achieve the same task. From this result it follows that any function with…
▽ More
Consider a quantum computer in combination with a binary oracle of domain size N. It is shown how N/2+sqrt(N) calls to the oracle are sufficient to guess the whole content of the oracle (being an N bit string) with probability greater than 95%. This contrasts the power of classical computers which would require N calls to achieve the same task. From this result it follows that any function with the N bits of the oracle as input can be calculated using N/2+sqrt(N) queries if we allow a small probability of error. It is also shown that this error probability can be made arbitrary small by using N/2+O(sqrt(N)) oracle queries.
In the second part of the article `approximate interrogation' is considered. This is when only a certain fraction of the N oracle bits are requested. Also for this scenario does the quantum algorithm outperform the classical protocols. An example is given where a quantum procedure with N/10 queries returns a string of which 80% of the bits are correct. Any classical protocol would need 6N/10 queries to establish such a correctness ratio.
△ Less
Submitted 11 September, 1998; v1 submitted 4 May, 1998;
originally announced May 1998.
-
Multiparty Quantum Communication Complexity
Authors:
Harry Buhrman,
Wim van Dam,
Peter Hoyer,
Alain Tapp
Abstract:
Quantum entanglement cannot be used to achieve direct communication between remote parties, but it can reduce the communication needed for some problems. Let each of k parties hold some partial input data to some fixed k-variable function f. The communication complexity of f is the minimum number of classical bits required to be broadcasted for every party to know the value of f on their inputs.…
▽ More
Quantum entanglement cannot be used to achieve direct communication between remote parties, but it can reduce the communication needed for some problems. Let each of k parties hold some partial input data to some fixed k-variable function f. The communication complexity of f is the minimum number of classical bits required to be broadcasted for every party to know the value of f on their inputs.
We construct a function G such that for the one-round communication model and three parties, G can be computed with n+1 bits of communication when the parties share prior entanglement. We then show that without entangled particles, the one-round communication complexity of G is (3/2)n + 1. Next we generalize this function to a function F. We show that if the parties share prior quantum entanglement, then the communication complexity of F is exactly k. We also show that if no entangled particles are provided, then the communication complexity of F is roughly k*log(k).
These two results prove for the first time communication complexity separations better than a constant number of bits.
△ Less
Submitted 3 June, 1999; v1 submitted 22 October, 1997;
originally announced October 1997.
-
Quantum Entanglement and the Communication Complexity of the Inner Product Function
Authors:
Richard Cleve,
Wim van Dam,
Michael Nielsen,
Alain Tapp
Abstract:
We consider the communication complexity of the binary inner product function in a variation of the two-party scenario where the parties have an a priori supply of particles in an entangled quantum state. We prove linear lower bounds for both exact protocols, as well as for protocols that determine the answer with bounded-error probability. Our proofs employ a novel kind of "quantum" reduction f…
▽ More
We consider the communication complexity of the binary inner product function in a variation of the two-party scenario where the parties have an a priori supply of particles in an entangled quantum state. We prove linear lower bounds for both exact protocols, as well as for protocols that determine the answer with bounded-error probability. Our proofs employ a novel kind of "quantum" reduction from a quantum information theory problem to the problem of computing the inner product. The communication required for the former problem can then be bounded by an application of Holevo's theorem. We also give a specific example of a probabilistic scenario where entanglement reduces the communication complexity of the inner product function by one bit.
△ Less
Submitted 11 March, 1998; v1 submitted 10 August, 1997;
originally announced August 1997.