Distributed Merlin-Arthur Synthesis of Quantum States and Its Applications_2

2025-04-27 0 0 742.54KB 25 页 10玖币
侵权投诉
Distributed Merlin-Arthur Synthesis of Quantum
States and Its Applications
François Le Gall #
Graduate School of Mathematics, Nagoya University, Nagoya, Japan
Masayuki Miyamoto #
Graduate School of Mathematics, Nagoya University, Nagoya, Japan
Harumichi Nishimura #
Graduate School of Informatics, Nagoya University, Nagoya, Japan
Abstract
The generation and verification of quantum states are fundamental tasks for quantum information
processing that have recently been investigated by Irani, Natarajan, Nirkhe, Rao and Yuen [CCC
2022], Rosenthal and Yuen [ITCS 2022], Metger and Yuen [FOCS 2023] under the term state
synthesis. This paper studies this concept from the viewpoint of quantum distributed computing,
and especially distributed quantum Merlin-Arthur (dQMA) protocols. We first introduce a novel
task, on a line, called state generation with distributed inputs (SGDI). In this task, the goal is
to generate the quantum state
U|ψ
at the rightmost node of the line, where
|ψ
is a quantum
state given at the leftmost node and
U
is a unitary matrix whose description is distributed over
the nodes of the line. We give a dQMA protocol for SGDI and utilize this protocol to construct
a dQMA protocol for the Set Equality problem studied by Naor, Parter and Yogev [SODA 2020],
and complement our protocol by showing classical lower bounds for this problem. Our second
contribution is a dQMA protocol, based on a recent work by Zhu and Hayashi [Physical Review A,
2019], to create EPR-pairs between adjacent nodes of a network without quantum communication.
As an application of this dQMA protocol, we prove a general result showing how to convert any
dQMA protocol on an arbitrary network into another dQMA protocol where the verification stage
does not require any quantum communication.
2012 ACM Subject Classification Theory of computation
Distributed algorithms; Theory of
computation Quantum computation theory
Keywords and phrases distributed quantum Merlin-Arthur, distributed verification, quantum com-
putation
1 Introduction
While quantum computational complexity has so far mostly investigated the complexity
of classical problems (e.g., computing Boolean functions) in the quantum setting, recent
works [
1
,
16
,
20
,
25
,
30
,
38
] have started investigating the complexity of quantum problems
(e.g., generating quantum states). For instance, Ji, Liu and Song [
20
] and Kretschmer [
25
]
have investigated the concept of quantum pseudorandom states from complexity-theoretic
and cryptographic perspectives. Irani, Natarajan, Nirkhe, Rao, and Yuen [
16
] have made
in-depth investigations of the complexity of the state synthesis problem in a setting first
introduced by Aaronson [
1
] where the goal is to generate a quantum state by making queries
to a classical oracle encoding the state. Rosenthal and Yuen [
38
] and Metger and Yuen [
30
]
have considered interactive proofs for synthesizing quantum states (and also for implementing
unitaries). Here the main goal is to generate complicated quantum states (e.g., quantum
states described by an exponential-size generating quantum circuit) efficiently with the help
of an all-powerful but untrusted prover. Note that in settings where an all-powerful prover
is present, the task of quantum state synthesis is closely related to the task of quantum
state verification (since the prover can simply send the quantum state that needs to be
arXiv:2210.01389v2 [quant-ph] 10 Aug 2023
2 Distributed Merlin-Arthur Synthesis of Quantum States and Its Applications
synthesized).
In this paper, we investigate the task of state generation and verification in the setting of
quantum distributed computing. Quantum distributed computing is a fairly recent research
topic: despite early investigations in the 2000s and the 2010s [
3
,
8
,
9
,
13
,
39
], it is only in
the past five years that significant advances have been done in understanding the power of
quantum distributed algorithms [
2
,
10
,
17
,
18
,
26
,
28
,
42
]. Fraigniaud, Le Gall, Nishimura,
and Paz [
10
], in particular, have investigated the power of distributed quantum proofs in
distributed computing, which is the natural quantum version of the concept of distributed
classical proofs (also called locally-checkable proofs [
14
] or proof-labeling schemes [
24
]): each
node of the network receives, additionally to its input, a quantum state (called a quantum
proof) from an all-powerful but untrusted party called the prover. The main result from [
10
]
shows that there exist classical problems that can be solved by quantum protocols using
quantum proofs of length exponentially smaller than in the classical case.
We present two main results about state generation and verification in the setting where
an all-powerful but untrusted prover helps the nodes in a non-interactive way, and apply
these results to design new quantum protocols for concrete problems studied recently in
[10, 35].
1.1 First result and applications: State Generation with Distributed
Inputs
One of the main conceptual contributions of this paper is introducing the following problem:
In a network of
r
+ 1 nodes
v0, v1, . . . , vr
, node
v0
is given as input an
n
-qubit quantum
state
|ψ
. The goal is to generate the quantum state
U|ψ
at node
vr
, where
U
is a unitary
matrix whose description is distributed over the nodes of the network. For concreteness, in
this paper we focus on the case where the network is a path of length
r
and the nodes
v0, vr
are both extremities of the path.1
Here is the precise description of the problem. The parties
v0, v1, . . . , vr
are the nodes of
a line graph of length
r
: the left-end extremity is
v0
, the right-end extremity is
vr
, and nodes
vj
and
vj+1
are connected for
j
= 0
,
1
, . . . , r
1. Node
v0
receives as input the classical
description of an
n
-qubit state
|ψ
, as a 2
n
-dimensional vector.
2
The other nodes
vj
for
j
= 1
,
2
, . . . , r
receive as input the description of an
n
-qubit unitary transformation: each
node
vj
receives the description of a unitary transformation
Uj
acting on
n
qubits. In this
setting, the aim is to generate the quantum state
|φr:= Ur···U1|ψ
at the right-end extremity
vr
. We call this problem
n
-qubit State Generation with Distributed
Inputs on the line of length
r
(
n
-qubit
SGDIr
). Without a prover, this problem is clearly not
solvable in less than
r
rounds of communications between neighbors (this can be seen easily
by considering the case where U1=··· =Ur=I).
We consider the setting where a prover (an all-powerful but untrusted party) helps the
nodes in a non-interactive way: at the very beginning of the protocol the prover sends to
1
In distributed computing it is standard to first investigate the complexity of computational problems on
simple network topologies such as a path or a ring. A solution on the path can often be extended to
networks of more complex topology, or be used as a building block for solving problems on network of
arbitrary topology.
2
Our protocol actually only requires
v0
to be able to generate many copies of
|ψ
, and thus also works
when the input is a description of a quantum circuit generating
|ψ
, or even a black box generating
|ψ
.
F. Le Gall, M. Miyamoto and H. Nishimura 3
node
vj
a quantum state
ρj
of at most
sc
qubits, for each
j∈ {
0
,
1
, . . . , r}
. Here
sc
is called
the certificate size of the protocol and the state
ρj
is called the certificate to
vj
. The nodes
then run a one-round
3
distributed quantum algorithm (called the verification algorithm).
More precisely, the nodes first perform one round of (synchronous) communication: each
node sends one quantum message of at most
sm
qubits to its neighbors (
sm
is called the
message size of the protocol). Each node then decides to either accept or reject. Such
protocols, which have been introduced and studied in [
10
], are called distributed Quantum
Merlin-Arthur (dQMA) protocols (see Section 2.2 for details). Additionally, when considering
dQMA protocols for
n
-qubit
SGDIr
, we add the requirement that node
vr
outputs an
n
-qubit
quantum state at the end of the protocol.
Here is our main result:
Theorem 1. For any constant
ε >
0, there exists a dQMA protocol for
n
-qubit
SGDIr
with
certificate size
O
(
n2r5
)and message size
O
(
nr2
)satisfying the following: (completeness)
There are certificates
ρ0, . . . , ρr
such that all the nodes accept and node
vr
outputs
|φr
with
probability 1; (soundness) If all the nodes accept with probability at least
ε
, then the output
state ρof node vrsatisfies φr|ρ|φr⟩ ≥ 1ε.
The protocol of Theorem 1 is a dQMA protocol with perfect completeness and soundness
ε
. Indeed, when receiving appropriate certificates from the prover, all nodes accept with
probability 1 and node
vr
outputs the state
|φr
. On the other hand, if the state
ρ
is far
from
|φr
, the soundness condition guarantees that for any certificates
ρ0, . . . , ρr
received
from the prover (including the case of entangled certificates), the probability that at least
one node rejects is at least 1
ε
(remember that the quantity
φr|ρ|φr
represents the square
root of the fidelity between |φr⟩⟨φr|and ρ— see Section 2.1 for details).
As an application of Theorem 1, we construct a quantum protocol for a concrete computa-
tional task called Set Equality, which was introduced in Ref. [
35
]. Here is the formal definition
over a network of arbitrary topology (represented by an arbitrary graph G= (V, E)).
Definition 1 (
SetEqualityℓ,U
[
35
]).Let
be a positive integer and
U
be a finite set. Each
node
u
of a graph
G
= (
V, E
)holds two lists of
elements (
au,1, . . . , au,ℓ
)and (
bu,1, . . . , bu,ℓ
)as
input, where
au,i, bu,i U
for all
i∈ {
1
,
2
, . . . , ℓ}
. Define
A
=
{au,i |uV, i ∈ {
1
,
2
, . . . , ℓ}}
and
B
=
{bu,i |uV, i ∈ {
1
,
2
, . . . , ℓ}}
. The output of
SetEqualityℓ,U
is 1(yes), if
A
=
B
as multisets and 0(no) otherwise.
Using Theorem 1 we obtain the following result:
Theorem 2. For any small enough constant
ε >
0, there exists a dQMA protocol for
SetEqualityℓ,U
on the line graph of length
r
with completeness 1
ε
and soundness
ε
that has
certificate size O(r5log2(ℓr) log2|U|)and message size O(r2log(ℓr) log |U|).
While Ref. [
35
] considered the special case of
SetEqualityℓ,U
and showed efficient distributed
interactive protocols with small certificate and message size (see Section 1.4), no (nontrivial)
classical dMA protocol (or lower bound) is known before this paper to our best knowledge.
We complement the result in Theorem 2 by showing classical lower bounds and upper bounds
of distributed Merlin-Arthur (dMA) protocols for SetEqualityℓ,U .
Theorem 3. For any dMA protocol for
SetEqualityℓ,U
on a line graph of length
r
with
certificate size sc, completeness 3/4, and soundness 1/4,
3
As in almost all prior works on (classical or quantum) distributed proofs, in this paper we consider only
one-round verification algorithms.
4 Distributed Merlin-Arthur Synthesis of Quantum States and Its Applications
if |U|< ℓ, then sc= Ω(|U|log(ℓ/|U|));
if |U|= Ω(), then sc= Ω();
if |U|= Ω(r), then sc= Ω(r).
Theorem 4. There exists a dMA protocol for
SetEqualityℓ,U
on a line graph of length
r
with completeness 1and soundness 0whose certificate size and message size are both
O(min{rlog |U|,|U|log(r)}).
Although the dependence in
r
is worse than in the classical dMA protocol of Theorem 4, the
dependence of the dQMA protocol of Theorem 2 in
(the number of elements each node
receives) and
|U|
(the size of the universal set) are polylogarithmic. On the other hand,
in classical case, we have linear lower bounds with respect to
and
|U|
as in Theorem 3.
Therefore Theorem 2 gives a significant improvement for sufficiently large
and
|U|
. This
assumption about the input parameters seems reasonable when considering applications
similar to those of the dQMA protocol for the equality problem proposed in Ref. [
10
]. Note
that our bounds of classical certificate size in Theorem 3 and Theorem 4 are tight up to
poly log(ℓ, |U|, r)factors when |U|< ℓ or |U|= Ω(r).
1.2 Second result and applications: EPR-pairs generation and LOCC
dQMA protocols
Our second contribution is a protocol, based on a recent work by Zhu and Hayashi [
46
], to
create EPR-pairs between adjacent nodes of a network without quantum communication
in the same setting as above, where a prover helps the nodes in a non-interactive way.
As an application of this protocol, we prove a general result showing how to convert any
dQMA protocol on an arbitrary network into another dQMA protocol where the verification
algorithm uses only classical communication (instead as quantum communication, as allowed
in the definition of dQMA protocols and used in all dQMA protocols of Ref. [
10
] and Theorems
1 and 2 above).
More precisely, we say a dQMA protocol is an LOCC (Local Operation and Classical
Communication) dQMA protocol if the verification algorithm can be implemented only by
local operations at each node and classical communication between neighboring nodes (i.e.,
no quantum communication is allowed). Our protocol for generating EPR-pairs enables us
to show the following theorem:
Theorem 5. For any constant
pc
and
ps
such that 0
ps< pc
1, let
P
be a dQMA
protocol for some problem on a network
G
with completeness
pc
, soundness
ps
, certificate size
sP
c
and message size
sP
m
. For any small enough constant
γ >
0, there exists an LOCC dQMA
protocol
P
for the same problem on
G
with completeness
pc
, soundness
ps
+
γ
, certificate
size
sP
c
+
O
(
dmaxsP
msP
tm
), and message size
O
(
sP
msP
tm
), where
dmax
is the maximum degree of
G, and sP
tm is the total number of qubits sent in the verification stage of P.
As an application of Theorem 5, we consider the equality problem studied in Ref. [
10
]. In
this problem, denoted
EQt
n
, a collection of
n
-bit strings
x1, x2, . . . , xt
is given as input to
t
specific nodes
u1, u2, . . . , ut
(called terminals) of an arbitrary network
G
= (
V, E
)as follows:
node
ui
receives
xi
, for
i∈ {
1
,
2
, . . . , t}
. The goal is to check whether the
t
strings are equal,
i.e., whether
x1
=
···
=
xt
. By applying Theorem 5 to the main result in Ref. [
10
] (a dQMA
protocol for
EQt
n
with certificate size
O
(
tr2log n
)and message size
O
(
tr2log
(
n
+
r
))), we
obtain the following corollary:
F. Le Gall, M. Miyamoto and H. Nishimura 5
Corollary 1. For any small enough constant
ε >
0, there is an LOCC dQMA protocol
for
EQt
n
with completeness 1, soundness
ε
, certificate size
O
(
dmax|V|t2r4log2
(
n
+
r
)) and
messages size
O
(
|V|t2r4log2
(
n
+
r
)), where
r
is the radius of the set of the
t
terminals and
|V|is the number of nodes of the network G= (V, E).
We can also apply Theorem 5 to the dQMA protocol of Theorem 2, leading to the
following corollary:
Corollary 2. For any small enough constant
ε >
0, there is an LOCC dQMA protocol for
SetEqualityℓ,U
on the line graph of length
r
with completeness 1
ε
, soundness
ε
, certificate
size O(r5log2(ℓr) log2|U|)and messages size O(r5log2(ℓr) log2|U|).
Note that these LOCC dQMA protocols still have good dependence in the main parameters
we are interested in: the parameter
n
for
EQt
n
(for which the dependence is still exponentially
better than any classical dMA protocols) and the parameters
and
|U|
for
SetEqualityℓ,U
(for which the dependence is still exponentially better than any classical dMA protocols, due
to Theorem 3).
1.3 Overview of our proofs
To explain the proof idea of Theorem 1, we only consider the simplified case
U1
=
···
=
Ur
=
I
.
The general case can be proved similarly by a slightly more complicated analysis.
The dQMA protocol to prove Theorem 1 is based on the dQMA protocol on the line
of length
r
by Fraigniaud et al. [
10
]. In the setting of Ref. [
10
], the left-end extremity
v0
has an
n
-bit string
x
, the right-end extremity
vr
has an
n
-bit string
y
, and the other
intermediate nodes have no input. The goal is to verify whether
x
=
y
. The dQMA protocol
in Ref. [
10
] checks whether the fingerprint state
|ψ0
=
|ψx
[
5
] prepared by
v0
is equal to
the fingerprint state
|ψr
=
|ψy
prepared by
vr
(
x
=
y
), or
|ψ0
is almost orthogonal to
|ψr
(
x̸
=
y
). For this, node
vj
(2
jr
1) receives a subsystem whose reduced state is
ρj
as a certificate from the prover. At the verification stage, any node (except for
vr
) chooses
keeping its certificate by itself, or sending it to the right neighboring node with probability
1
/
2to check if the reduced states of the two neighboring nodes,
ρj
and
ρj+1
, are close, which
can be checked by the SWAP test [
5
] (using Lemma 7). If
x
=
y
, then the prover can send
|ψ0
(=
|ψr
)for every intermediate node to pass all the SWAP tests done at the verification
stage, which means accept. Otherwise, the SWAP test done at some node rejects with a
reasonable probability since
|ψx
is very far from
|ψy
, and hence the distance between
ρj
and ρj+1 should be far at some j.
Now the case that
U1
=
···
=
Ur
=
I
(which means that all nodes except
v0
have no
input) in the setting of
SGDIr
(then the goal state
|φr
at
vr
is the same as the state
|ψ
of
v0
) is similar to the setting of Ref. [
10
], except that
vr
also has no input. The difficulty is
that
vr
has no state that can be generated by itself, and thus the analysis of Ref. [
10
] cannot
be used as it is.
To overcome this difficulty, we utilize an idea from the verification of graph states [
15
,
34
],
in particular, the idea by Morimae, Takeuchi, and Hayashi [
34
]. They used the following
basic idea for their protocol in order to verify an arbitrary graph state
|G
sent from the
prover (or prepared by a malicious party): (i) the verifier receives (
m
+
k
+ 1) subsystems,
in which each subsystem ideally contains
|G
, from the prover; (ii) the verifier chooses
m
subsystems uniformly at random, and discards them; (iii) the verifier chooses one subsystem,
and some test that
|G
should pass (stabilizer test) is done for each of the remaining
k
subsystems; and (iv) if all the tests passed, the chosen subsystem in (iii) should be close
摘要:

DistributedMerlin-ArthurSynthesisofQuantumStatesandItsApplicationsFrançoisLeGall#GraduateSchoolofMathematics,NagoyaUniversity,Nagoya,JapanMasayukiMiyamoto#GraduateSchoolofMathematics,NagoyaUniversity,Nagoya,JapanHarumichiNishimura#GraduateSchoolofInformatics,NagoyaUniversity,Nagoya,JapanAbstractTheg...

展开>> 收起<<
Distributed Merlin-Arthur Synthesis of Quantum States and Its Applications_2.pdf

共25页,预览5页

还剩页未读, 继续阅读

声明:本站为文档C2C交易模式,即用户上传的文档直接被用户下载,本站只是中间服务平台,本站所有文档下载所得的收益归上传人(含作者)所有。玖贝云文库仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。若文档所含内容侵犯了您的版权或隐私,请立即通知玖贝云文库,我们立即给予删除!
分类:图书资源 价格:10玖币 属性:25 页 大小:742.54KB 格式:PDF 时间:2025-04-27

开通VIP享超值会员特权

  • 多端同步记录
  • 高速下载文档
  • 免费文档工具
  • 分享文档赚钱
  • 每日登录抽奖
  • 优质衍生服务
/ 25
客服
关注