Andrew Childs University of Maryland Arxiv:1711.10980

Total Page:16

File Type:pdf, Size:1020Kb

Andrew Childs University of Maryland Arxiv:1711.10980 Toward the first quantum simulation with quantum speedup Andrew Childs University of Maryland Dmitri Maslov Yunseong Nam Neil Julien Ross Yuan Su arXiv:1711.10980 Simulating Hamiltonian dynamics on a small quantum computer Andrew Childs Department of Combinatorics & Optimization and Institute for Quantum Computing University of Waterloo based in part on joint work with Dominic Berry, Richard Cleve, Robin Kothari, and Rolando Somma Workshop on What do we do with a small quantum computer? IBM Watson, 9 December 2013 Toward practical quantum speedup IBM Google/UCSB Delft Maryland Important early goal: demonstrate quantum computational advantage … but can we find a practical application of near-term devices? Challenges • Improve experimental systems • Improve algorithms and their implementation, making the best use of available hardware Our goal: Produce concrete resource estimates for the simplest possible practical application of quantum computers Quantum simulation “… nature isn’t classical, dammit, A classical computer cannot even represent and if you want to make a the state efficiently. simulation of nature, you’d better make it quantum mechanical, and by golly it’s a wonderful problem, A quantum computer cannot produce a because it doesn’t look so easy.” complete description of the state. Richard Feynman (1981) Simulating physics with computers But given succinct descriptions of • the initial state (suitable for a quantum computer to prepare it efficiently) and Quantum simulation problem: Given a • a final measurement (say, measurements description of the Hamiltonian H, an of the individual qubits in some basis), evolution time t, and an initial state (0) , a quantum computer can efficiently answer produce the final state ( t ) (to within| i questions that (apparently) a classical one some error tolerance ²|) i cannot. Product formula simulation L To get a better approximation, use higher-order Suppose we want to simulate H = H` formulas. `=1 X E.g., second order: iAt/2r iBt iAt/2r r i(A+B)t Combine individual simulations with the Lie (e− e− e− ) = e− product formula. E.g., with two terms: + O(t3/r2) iAt/r iBt/r r i(A+B)t lim e− e− = e− Systematic expansions to arbitrary order are r !1 known [Suzuki 92] r e iAt/re iBt/r = e i(A+B)t + O(t2/r) − − − Using the 2kth order expansion, the number of exponentials required for an approximation To ensure error at most ², take with error at most ² is at most 2 r = O ( H t) /✏ 1/2k 2k 2 L H t k k 5 L H t k k k k ✏ ⇣ ⌘ [Lloyd 96] [Berry, Ahokas, Cleve, Sanders 07] Quantum walk simulation Quantum walk corresponding to H Simulation by phase estimation N Alternately reflect about span j , λ λ arcsin^λ (phase estimation) {| i}j=1 N | i 7! | i| i iλt ^ j := j ⌫ H⇤ k + ⌫j N +1 , e− λ arcsin λ | i | i⌦ jk| i | i 7! | i| i ✓ k=1 ◆ iλt X q e− λ (inverse phase est) and swap the two registers. 7! | i If H is sparse, this walk is easy to implement. Theorem: O ( t/ p ✏ ) steps of this walk suffice to simulate H for time t with error at most ². Spectral theorem: Each eigenvalue ¸ of H i arcsin λ corresponds to two eigenvalues e± of the walk operator (with eigenvectors± closely related to those of H). [Childs10; Berry, Childs 12] Taylor series simulation Main idea: Directly implement the series LCU Lemma: Given the ability to perform k unitaries Vj with unit complexity, one can iHt 1 ( iHt) e− = − perform the operation U = β V with k! j j j k=0 complexity O ( β ) . Furthermore, if U is X j | j| K (nearly) unitary then this implementationP can ( iHt)k − be made (nearly)P deterministic. ⇡ k! k=0 X Main ideas: Write H = ` ↵ ` H ` with H ` unitary. • Implement U with some amplitude: P 0 sin ✓ 0 U + cos ✓ Φ Then | i| i 7! | i | i | i • Boost the amplitude for success by oblivious K ( it)k amplitude amplification − k! ↵`1 ↵`k H`1 H`k ··· ··· log(t/✏) kX=0 `1X,...,`k Query complexity: O t is a linear combination of unitaries. log log(t/✏) [Berry, Childs, Cleve, Kothari, Somma 14 & 15] Quantum signal processing Combining known lower bounds on the complexity of simulation as a function of t and ² gives 1 t log ✏ log ✏ ⌦ t + 1 vs. upper bound of O t t log log ✏ log log ✏ ⇣ ⌘ ⇣ ⌘ Recent work, using an alternative method for implementing a linear combination of quantum walk steps, gives an optimal tradeoff. Main idea: Encode the eigenvalues of H in a two-dimensional subspace; use a carefully-chosen sequence of single-qubit rotations to manipulate those eigenvalues, performing the desired evolution. [Low, Chuang 16] Algorithm comparison Algorithm Query complexity Gate complexity Product formula, 1st order O(d4t2/✏) O(d4t2/✏) 2k 3 dt 1/2k 2k 3 dt 1/2k Product formula, (2k)th order O 5 d t( ✏ ) O 5 d t( ✏ ) Quantum walk O(dt/p✏) O(dt/p✏) 2 log(dt/✏) 2 log2(dt/✏) Fractional-query simulation O d t log log(dt/✏) O d t log log(dt/✏) 2 log(dt/✏) 2 log2(dt/✏) Taylor series O d t log log(dt/✏) O d t log log(dt/✏) log(dt/✏) log3.5(dt/✏) Linear combination of q. walk steps O dt log log(dt/✏) O dt log log(dt/✏) log(1/✏) log(1/✏) Quantum signal processing O dt + log log(1/✏) O dt + log log(1/✏) OPTIMAL! What to simulate? Quantum chemistry? Spin systems! n Heisenberg model on a ring: H = ~ ~ + h σz h [ h, h] uniformly random j · j+1 j j j 2 − j=1 X This provides a model of self-thermalization and many-body localization. The transition between thermalized and localized phases (as a function of h) is poorly understood. Most extensive numerical study: fewer than 25 spins. [Luitz, Laflorencie, Alet 15] Could explore the transition by preparing a simple initial state, evolving, and performing a simple final measurement. Focus on the cost of simulating dynamics. 3 For concreteness: h =1,t= n, ✏ = 10− , 20 n 100 Algorithms Algorithm Gate complexity (t, ²) Gate complexity (n) Product formula (PF), 1st order O(t2/✏) O(n5) Product formula (PF), (2k)th order O(52kt1+1/2k/✏1/2k) O(52kn3+1/k) Quantum walk O(t/p✏) O(n4 log n) log2(t/✏) 4 log2 n Fractional-query simulation O t log log(t/✏) O n log log n 2 log (t/✏) 3 log2 n Taylor series (TS) O t log log(t/✏) O n log log n log3.5(t/✏) 4 log2 n Linear combination of q. walk steps O t log log(t/✏) O n log log n Quantum signal processing (QSP) O(t + log(1/✏)) O(n3) Algorithms Algorithm Gate complexity (t, ²) Gate complexity (n) Product formula (PF), 1st order O(t2/✏) O(n5) Product formula (PF), (2k)th order O(52kt1+1/2k/✏1/2k) O(52kn3+1/k) Quantum walk O(t/p✏) O(n4 log n) log2(t/✏) 4 log2 n Fractional-query simulation O t log log(t/✏) O n log log n 2 log (t/✏) 3 log2 n Taylor series (TS) O t log log(t/✏) O n log log n log3.5(t/✏) 4 log2 n Linear combination of q. walk steps O t log log(t/✏) O n log log n Quantum signal processing (QSP) O(t + log(1/✏)) O(n3) multiplexor :: [Double] -> [Qubit] -> Qubit -> Circ ([Qubit], Qubit) multiplexor as controls target = case controls of -- No controls. [] -> do let angle = as !! 0 Circuit synthesis expYt (- angle) target return ([], target) -- One control. [q0] -> do let (as0, as1) = split_angles as ([], target) <- multiplexor as0 [] target target <- qnot target `controlled` q0 ([], target) <- multiplexor as1 [] target target <- qnot target `controlled` q0 We implemented these algorithms using return ([q0], target) -- Two controls. [q0,q1] -> do let (as0, as1) = split_angles as Quipper, a quantum circuit description language ([q1], target) <- multiplexor as0 [q1] target target <- qnot target `controlled` q0 ([q1], target) <- multiplexor as1 [q1] target target <- qnot target `controlled` q0 that facilitates concrete resource counts. return ([q0,q1], target) -- Three controls. [q0,q1,q2] -> do let (as0, as1, as2, as3) = split_angles_3 as ([q2], target) <- multiplexor as0 [q2] target target <- qnot target `controlled` q1 ([q2], target) <- multiplexor as1 [q2] target target <- qnot target `controlled` q0 Gate sets: ([q2], target) <- multiplexor as3 [q2] target target <- qnot target `controlled` q1 ([q2], target) <- multiplexor as2 [q2] target target <- qnot target `controlled` q0 • Clifford+Rz return ([q0,q1,q2], target) -- Four or more controls. qs -> do let (as0, as1) = split_angles as let (qhead:qtail) = qs (qtail, target) <- multiplexor as0 qtail target • Clifford+T target <- qnot target `controlled` qhead (qtail, target) <- multiplexor as1 qtail target target <- qnot target `controlled` qhead return (qs, target) where -- Compute angles for recursive decomposition of a multiplexor. split_angles :: [Double] -> ([Double], [Double]) Quipper can produce Clifford+T circuits split_angles l = let (l1, l2) = splitIn2 l in let p w x = (w + x) / 2 in let m w x = (w - x) / 2 in using recent optimal synthesis algorithms (zipWith p l1 l2, zipWith m l1 l2) -- Compute the angles for recursive decomposition of a multiplexor -- with three controls, saving 2 CNOT gates, as in the -- optimization in Fig. 2 of Shende et.al. split_angles_3 :: [Double] -> ([Double],[Double],[Double],[Double]) [Kliuchnikov, Maslov, Mosca 13; Ross, Selinger 16]. split_angles_3 l = let (l1, l2, l3, l4) = splitIn4 l in let pp w x y z = (w + x + y + z) / 4 in let pm w x y z = (w + x - y - z) / 4 in let mp w x y z = (w - x - y + z) / 4 in let mm w x y z = (w - x + y - z) / 4 in let lpp = zipWith4 pp l1 l2 l3 l4 in We verified correctness by simulating subroutines and small instances.
Recommended publications
  • On the Tightness of the Buhrman-Cleve-Wigderson Simulation
    On the tightness of the Buhrman-Cleve-Wigderson simulation Shengyu Zhang Department of Computer Science and Engineering, The Chinese University of Hong Kong. [email protected] Abstract. Buhrman, Cleve and Wigderson gave a general communica- 1 1 n n tion protocol for block-composed functions f(g1(x ; y ); ··· ; gn(x ; y )) by simulating a decision tree computation for f [3]. It is also well-known that this simulation can be very inefficient for some functions f and (g1; ··· ; gn). In this paper we show that the simulation is actually poly- nomially tight up to the choice of (g1; ··· ; gn). This also implies that the classical and quantum communication complexities of certain block- composed functions are polynomially related. 1 Introduction Decision tree complexity [4] and communication complexity [7] are two concrete models for studying computational complexity. In [3], Buhrman, Cleve and Wigderson gave a general method to design communication 1 1 n n protocol for block-composed functions f(g1(x ; y ); ··· ; gn(x ; y )). The basic idea is to simulate the decision tree computation for f, with queries i i of the i-th variable answered by a communication protocol for gi(x ; y ). In the language of complexity measures, this result gives CC(f(g1; ··· ; gn)) = O~(DT(f) · max CC(gi)) (1) i where CC and DT are the communication complexity and the decision tree complexity, respectively. This simulation holds for all the models: deterministic, randomized and quantum1. It is also well known that the communication protocol by the above simulation can be very inefficient.
    [Show full text]
  • Thesis Is Owed to Him, Either Directly Or Indirectly
    UvA-DARE (Digital Academic Repository) Quantum Computing and Communication Complexity de Wolf, R.M. Publication date 2001 Document Version Final published version Link to publication Citation for published version (APA): de Wolf, R. M. (2001). Quantum Computing and Communication Complexity. Institute for Logic, Language and Computation. General rights It is not permitted to download or to forward/distribute the text or part of it without the consent of the author(s) and/or copyright holder(s), other than for strictly personal, individual use, unless the work is under an open content license (like Creative Commons). Disclaimer/Complaints regulations If you believe that digital publication of certain material infringes any of your rights or (privacy) interests, please let the Library know, stating your reasons. In case of a legitimate complaint, the Library will make the material inaccessible and/or remove it from the website. Please Ask the Library: https://uba.uva.nl/en/contact, or a letter to: Library of the University of Amsterdam, Secretariat, Singel 425, 1012 WP Amsterdam, The Netherlands. You will be contacted as soon as possible. UvA-DARE is a service provided by the library of the University of Amsterdam (https://dare.uva.nl) Download date:30 Sep 2021 Quantum Computing and Communication Complexity Ronald de Wolf Quantum Computing and Communication Complexity ILLC Dissertation Series 2001-06 For further information about ILLC-publications, please contact Institute for Logic, Language and Computation Universiteit van Amsterdam Plantage Muidergracht 24 1018 TV Amsterdam phone: +31-20-525 6051 fax: +31-20-525 5206 e-mail: [email protected] homepage: http://www.illc.uva.nl/ Quantum Computing and Communication Complexity Academisch Proefschrift ter verkrijging van de graad van doctor aan de Universiteit van Amsterdam op gezag van de Rector Magni¯cus prof.dr.
    [Show full text]
  • Efficient Quantum Algorithms for Simulating Lindblad Evolution
    Efficient Quantum Algorithms for Simulating Lindblad Evolution∗ Richard Cleveyzx Chunhao Wangyz Abstract We consider the natural generalization of the Schr¨odingerequation to Markovian open system dynamics: the so-called the Lindblad equation. We give a quantum algorithm for simulating the evolution of an n-qubit system for time t within precision . If the Lindbladian consists of poly(n) operators that can each be expressed as a linear combination of poly(n) tensor products of Pauli operators then the gate cost of our algorithm is O(t polylog(t/)poly(n)). We also obtain similar bounds for the cases where the Lindbladian consists of local operators, and where the Lindbladian consists of sparse operators. This is remarkable in light of evidence that we provide indicating that the above efficiency is impossible to attain by first expressing Lindblad evolution as Schr¨odingerevolution on a larger system and tracing out the ancillary system: the cost of such a reduction incurs an efficiency overhead of O(t2/) even before the Hamiltonian evolution simulation begins. Instead, the approach of our algorithm is to use a novel variation of the \linear combinations of unitaries" construction that pertains to channels. 1 Introduction The problem of simulating the evolution of closed systems (captured by the Schr¨odingerequation) was proposed by Feynman [11] in 1982 as a motivation for building quantum computers. Since then, several quantum algorithms have appeared for this problem (see subsection 1.1 for references to these algorithms). However, many quantum systems of interest are not closed but are well-captured by the Lindblad Master equation [20, 12].
    [Show full text]
  • Arxiv:1611.07995V1 [Quant-Ph] 23 Nov 2016
    Factoring using 2n + 2 qubits with Toffoli based modular multiplication Thomas H¨aner∗ Station Q Quantum Architectures and Computation Group, Microsoft Research, Redmond, WA 98052, USA and Institute for Theoretical Physics, ETH Zurich, 8093 Zurich, Switzerland Martin Roettelery and Krysta M. Svorez Station Q Quantum Architectures and Computation Group, Microsoft Research, Redmond, WA 98052, USA We describe an implementation of Shor's quantum algorithm to factor n-bit integers using only 2n+2 qubits. In contrast to previous space-optimized implementations, ours features a purely Toffoli based modular multiplication circuit. The circuit depth and the overall gate count are in (n3) and (n3 log n), respectively. We thus achieve the same space and time costs as TakahashiO et al. [1], Owhile using a purely classical modular multiplication circuit. As a consequence, our approach evades most of the cost overheads originating from rotation synthesis and enables testing and localization of faults in both, the logical level circuit and an actual quantum hardware implementation. Our new (in-place) constant-adder, which is used to construct the modular multiplication circuit, uses only dirty ancilla qubits and features a circuit size and depth in (n log n) and (n), respectively. O O I. INTRODUCTION Cuccaro [5] Takahashi [6] Draper [4] Our adder Size Θ(n) Θ(n) Θ(n2) Θ(n log n) Quantum computers offer an exponential speedup over Depth Θ(n) Θ(n) Θ(n) Θ(n) their classical counterparts for solving certain problems, n the most famous of which is Shor's algorithm [2] for fac- Ancillas n+1 (clean) n (clean) 0 2 (dirty) toring a large number N | an algorithm that enables the breaking of many popular encryption schemes including Table I.
    [Show full text]
  • Hamiltonian Simulation with Nearly Optimal Dependence on All Parameters
    Hamiltonian simulation with nearly optimal dependence on all parameters Dominic W. Berry∗ Andrew M. Childsy Robin Kothariz We present an algorithm for sparse Hamiltonian simulation that has optimal dependence on all pa- rameters of interest (up to log factors). Previous algorithms had optimal or near-optimal scaling in some parameters at the cost of poor scaling in others. Hamiltonian simulation via quantum walk has optimal dependence on the sparsity d at the expense of poor scaling in the allowed error . In contrast, an ap- proach based on fractional-query simulation provides optimal scaling in at the expense of poor scaling in d. Here we combine the two approaches, achieving the best features of both. By implementing a linear combination of quantum walk steps with coefficients given by Bessel functions, our algorithm achieves near-linear scaling in τ := dkHkmaxt and sublogarithmic scaling in 1/. Our dependence on is optimal, and we prove a new lower bound ruling out sublinear dependence on τ. The problem of simulating the dynamics of quantum systems was the original motivation for quantum com- puters [14] and remains one of their major potential applications. The first explicit quantum simulation algorithm [16] gave a method for simulating Hamiltonians that are sums of local interaction terms. Aharonov and Ta-Shma gave an efficient simulation algorithm for the more general class of sparse Hamiltonians [2], and much subsequent work has given improved simulations [4,5,6,7,8, 12, 17, 18]. Sparse Hamiltonians include most physically realistic Hamiltonians as a special case. In addition, sparse Hamiltonian simulation can also be used to design other quantum algorithms [9, 10, 15].
    [Show full text]
  • Quantum Computing: Lecture Notes
    Quantum Computing: Lecture Notes Ronald de Wolf Preface These lecture notes were formed in small chunks during my “Quantum computing” course at the University of Amsterdam, Feb-May 2011, and compiled into one text thereafter. Each chapter was covered in a lecture of 2 45 minutes, with an additional 45-minute lecture for exercises and × homework. The first half of the course (Chapters 1–7) covers quantum algorithms, the second half covers quantum complexity (Chapters 8–9), stuff involving Alice and Bob (Chapters 10–13), and error-correction (Chapter 14). A 15th lecture about physical implementations and general outlook was more sketchy, and I didn’t write lecture notes for it. These chapters may also be read as a general introduction to the area of quantum computation and information from the perspective of a theoretical computer scientist. While I made an effort to make the text self-contained and consistent, it may still be somewhat rough around the edges; I hope to continue polishing and adding to it. Comments & constructive criticism are very welcome, and can be sent to [email protected] Attribution and acknowledgements Most of the material in Chapters 1–6 comes from the first chapter of my PhD thesis [71], with a number of additions: the lower bound for Simon, the Fourier transform, the geometric explanation of Grover. Chapter 7 is newly written for these notes, inspired by Santha’s survey [62]. Chapters 8 and 9 are largely new as well. Section 3 of Chapter 8, and most of Chapter 10 are taken (with many changes) from my “quantum proofs” survey paper with Andy Drucker [28].
    [Show full text]
  • Quantum Information Theory by Michael Aaron Nielsen
    Quantum Information Theory By Michael Aaron Nielsen B.Sc., University of Queensland, 1993 B.Sc. (First Class Honours), Mathematics, University of Queensland, 1994 M.Sc., Physics, University of Queensland, 1998 DISSERTATION Submitted in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy Physics The University of New Mexico Albuquerque, New Mexico, USA December 1998 c 1998, Michael Aaron Nielsen ii Dedicated to the memory of Michael Gerard Kennedy 24 January 1951 – 3 June 1998 iii Acknowledgments It is a great pleasure to thank the many people who have contributed to this Dissertation. My deepest thanks goes to my friends and family, especially my parents, Howard and Wendy, for their support and encouragement. Warm thanks also to the many other people who have con- tributed to this Dissertation, especially Carl Caves, who has been a terrific mentor, colleague, and friend; to Gerard Milburn, who got me started in physics, in research, and in quantum in- formation; and to Ben Schumacher, whose boundless enthusiasm and encouragement has provided so much inspiration for my research. Throughout my graduate career I have had the pleasure of many enjoyable and helpful discussions with Howard Barnum, Ike Chuang, Chris Fuchs, Ray- mond Laflamme, Manny Knill, Mark Tracy, and Wojtek Zurek. In particular, Howard Barnum, Carl Caves, Chris Fuchs, Manny Knill, and Ben Schumacher helped me learn much of what I know about quantum operations, entropy, and distance measures for quantum information. The material reviewed in chapters 3 through 5 I learnt in no small measure from these people. Many other friends and colleagues have contributed to this Dissertation.
    [Show full text]
  • Exponential Improvement in Precision for Simulating Sparse Hamiltonians
    Exponential improvement in precision for simulating sparse Hamiltonians , , Dominic W. Berry∗ Andrew M. Childs† ‡ Richard Cleve§ ‡ Robin Kothari§ Rolando D. Somma¶ Abstract We provide a quantum algorithm for simulating the dynamics of sparse Hamiltonians with complexity sublogarithmic in the inverse error, an exponential improvement over previous meth- ods. Specifically, we show that a d-sparse Hamiltonian H acting on n qubits can be simulated 2 log(τ/ǫ) log (τ/ǫ) for time t with precision ǫ using O τ log log(τ/ǫ) queries and O τ log log(τ/ǫ) n additional 2-qubit 2 gates, where τ = d H maxt. Unlike previous approaches based on product formulas, the query complexity is independentk k of the number of qubits acted on, and for time-varying Hamiltonians, the gate complexity is logarithmic in the norm of the derivative of the Hamiltonian. Our al- gorithm is based on a significantly improved simulation of the continuous- and fractional-query models using discrete quantum queries, showing that the former models are not much more powerful than the discrete model even for very small error. We also simplify the analysis of this conversion, avoiding the need for a complex fault correction procedure. Our simplification relies on a new form of “oblivious amplitude amplification” that can be applied even though the reflection about the input state is unavailable. Finally, we prove new lower bounds showing that our algorithms are optimal as a function of the error. 1 Introduction Simulation of quantum mechanical systems is a major potential application of quantum computers. Indeed, the problem of simulating Hamiltonian dynamics was the original motivation for the idea of quantum computation [21].
    [Show full text]
  • Elementary Gates for Quantum Computation
    PHYSICAL REVIEW A VOLUME 52, NUMBER 5 NOVEMBER 1995 Elementary gates for quantum computation Adriano Barenco, ' Charles H. Bennett, '~ Richard Cleve, '~ David P. DiVincenzo, '~ Norman Margolus, '~ Peter Shor, Tycho Sleator, ~ John A. Smolin, and Harald Weinfurter 'Clarendon Laboratory, Oxford University, Oxford OXI 3PU, United Kingdom IBM Research, Yorktown Heights, ¹wYork 10598 Department of Computer Science, University of Calgary, Calgary, Alberta, Canada T2N IN4 Laboratory for Computer Science, Massachusetts Institute of Technology, Cambridge, Massachusetts 02139 ATckT Bell Laboratories, Murray Hill, New Jersey 07974 Physics Department, New York University, New York, New York 10003 Physics Department, University of California at Los Angeles, Los Angeles, California 90024 Institute for Experimental Physics, University of Innsbruck, A-6020 Innsbruck, Austria (Received 22 March 1995) We show that a set of gates that consists of all one-bit quantum gates [U(2)] and the two-bit exclusive-oR gate [that maps Boolean values (x,y) to (x,x&y)] is universal in the sense that all unitary operations on arbitrarily many bits n [U(2")] can be expressed as compositions of these gates. We investigate the number of the above gates required to implement other gates, such as generalized Deutsch-Toffoli gates, that apply a specific U(2) transformation to one input bit if and only if the logical AND of all remaining input bits is satisfied. These gates play a central role in many proposed constructions of quantum computational networks. We derive upper and lower bounds on the exact number of elementary gates required to build up a variety of two- and three-bit quantum gates, the asymptotic number required for n-bit Deutsch-Toffoli gates, and make some observations about the number required for arbitrary n-bit unitary operations.
    [Show full text]
  • Quantum Interpolation of Polynomials
    Quantum interpolation of polynomials Daniel M. Kane∗ Samuel A. Kutin† August 2009 Abstract We consider quantum interpolation of polynomials. We imagine a quantum com- puter with black-box access to input/output pairs (xi,f(xi)), where f is a degree-d polynomial, and we wish to compute f(0). We give asymptotically tight quantum lower bounds for this problem, even in the case where 0 is among the possible values of xi. 1 Introduction Can a quantum computer efficiently interpolate polynomials? Can it distinguish low-degree from high-degree polynomials? We consider black-box algorithms that seek to learn infor- mation about a polynomial f from input/output pairs (xi, f(xi)). We define a more general class of (d,S)-independent function properties, where, outside of a set S of exceptions, know- ing d input values does not help one predict the answer. There are essentially two strategies to computing such a function: query d + 1 random input values, or search for one of the S | | exceptions. We show that, up to constant factors, we cannot beat these two approaches. Let be a collection of functions from some domain D to some range R. A property F is a (nontrivial) map : 0, 1 . We say that is (d,S)-independent for some subset P F →{ } P S D if, for any z , ..., zd D with z , ..., zr S and zr , ..., zd / S (where ⊆ 1 ∈ 1 ∈ +1 ∈ r = zi S ), the (d r)-tuple of values (f(zr ),...,f(zd)) is independent of the (r + 1)- |{ } ∩ | − +1 tuple (f(z1),...,f(zr), (f)).
    [Show full text]
  • Computational Problems Related to Open Quantum Systems
    Computational Problems Related to Open Quantum Systems by Chunhao Wang A thesis presented to the University of Waterloo in fulfillment of the thesis requirement for the degree of Doctor of Philosophy in Computer Science Waterloo, Ontario, Canada, 2018 © Chunhao Wang 2018 Examining Committee Membership The following served on the Examining Committee for this thesis. The decision of the Examining Committee is by majority vote. External Examiner: Hoi Fung Chau Professor, Department of Physics, The University of Hong Kong Supervisor(s): Richard Cleve Professor, Cheriton School of Computer Science, University of Waterloo Internal Member: Debbie Leung Professor, Department of Combinatorics and Optimization, University of Waterloo Internal Member: John Watrous Professor, Cheriton School of Computer Science, University of Waterloo Internal-External Member: Ashwin Nayak Professor, Department of Combinatorics and Optimization, University of Waterloo ii I hereby declare that I am the sole author of this thesis. This is a true copy of the thesis, including any required final revisions, as accepted by my examiners. I understand that my thesis may be made electronically available to the public. iii Abstract A quantum system that has interaction with external resources, such as probability dis- tribution, dissipation, and noise, is referred to as an open quantum system. Not only do open quantum systems play a vital role in the field of quantum physics, but they are also fundamental objects in quantum information and quantum computing. In this thesis, we focus on computational problems related to open quantum systems. In particular, we study efficient constructions of open quantum systems and their algorithmic applications. A unitary 2-design is a quantum analogue of universal 2-hash functions.
    [Show full text]
  • Sample Complexity of Hidden Subgroup Problem
    Sample complexity of hidden subgroup problem Zekun Ye Institute of Quantum Computing and Computer Science Theory, School of Computer Science and Engineering, Sun Yat-sen University, Guangzhou 510006, China [email protected] Lvzhou Li ! Institute of Quantum Computing and Computer Science Theory, School of Computer Science and Engineering, Sun Yat-sen University, Guangzhou 510006, China Ministry of Education Key Laboratory of Machine Intelligence and Advanced Computing (Sun Yat-sen University), Guangzhou 510006, China [email protected] Abstract The hidden subgroup problem (HSP) has been attracting much attention in quantum computing, since several well-known quantum algorithms including Shor algorithm can be described in a uniform framework as quantum methods to address different instances of it. One of the central issues about HSP is to characterize its quantum/classical complexity. For example, from the viewpoint of learning theory, sample complexity is a crucial concept. However, while the quantum sample complexity of the problem has been studied, a full characterization of the classical sample complexity of HSP seems to be absent, which will thus be the topic in this paper. HSP over a finite group is defined as follows: For a finite group G and a finite set V , given a function f : G → V and the promise that for any x, y ∈ G, f(x) = f(xy) iff y ∈ H for a subgroup H ∈ H, where H is a set of candidate subgroups of G, the goal is to identify H. Our contributions are as follows: i) For HSP, we show that the number of uniform examples necessary to learn the hidden subgroup ( )! log |H| r |G| log |H| with bounded error is at least Ω max min |G| , min |G| , and on the other log |H| log H∈H |H| H∈H |H| n q o hand, O max sr(H), |G| sr(H) uniform examples are sufficient, where sr(H) = max r(H) H∈H |H| H∈H and r(H) is the rank of H.
    [Show full text]