7,439 research outputs found
Trading locality for time: certifiable randomness from low-depth circuits
The generation of certifiable randomness is the most fundamental
information-theoretic task that meaningfully separates quantum devices from
their classical counterparts. We propose a protocol for exponential certified
randomness expansion using a single quantum device. The protocol calls for the
device to implement a simple quantum circuit of constant depth on a 2D lattice
of qubits. The output of the circuit can be verified classically in linear
time, and is guaranteed to contain a polynomial number of certified random bits
assuming that the device used to generate the output operated using a
(classical or quantum) circuit of sub-logarithmic depth. This assumption
contrasts with the locality assumption used for randomness certification based
on Bell inequality violation or computational assumptions. To demonstrate
randomness generation it is sufficient for a device to sample from the ideal
output distribution within constant statistical distance.
Our procedure is inspired by recent work of Bravyi et al. (Science 2018), who
introduced a relational problem that can be solved by a constant-depth quantum
circuit, but provably cannot be solved by any classical circuit of
sub-logarithmic depth. We develop the discovery of Bravyi et al. into a
framework for robust randomness expansion. Our proposal does not rest on any
complexity-theoretic conjectures, but relies on the physical assumption that
the adversarial device being tested implements a circuit of sub-logarithmic
depth. Success on our task can be easily verified in classical linear time.
Finally, our task is more noise-tolerant than most other existing proposals
that can only tolerate multiplicative error, or require additional conjectures
from complexity theory; in contrast, we are able to allow a small constant
additive error in total variation distance between the sampled and ideal
distributions.Comment: 36 pages, 2 figure
Theoretical framework for quantum networks
We present a framework to treat quantum networks and all possible
transformations thereof, including as special cases all possible manipulations
of quantum states, measurements, and channels, such as, e.g., cloning,
discrimination, estimation, and tomography. Our framework is based on the
concepts of quantum comb-which describes all transformations achievable by a
given quantum network-and link product-the operation of connecting two quantum
networks. Quantum networks are treated both from a constructive point of
view-based on connections of elementary circuits-and from an axiomatic
one-based on a hierarchy of admissible quantum maps. In the axiomatic context a
fundamental property is shown, which we call universality of quantum memory
channels: any admissible transformation of quantum networks can be realized by
a suitable sequence of memory channels. The open problem whether this property
fails for some nonquantum theory, e.g., for no-signaling boxes, is posed.Comment: 23 pages, revtex
Quantum Proofs
Quantum information and computation provide a fascinating twist on the notion
of proofs in computational complexity theory. For instance, one may consider a
quantum computational analogue of the complexity class \class{NP}, known as
QMA, in which a quantum state plays the role of a proof (also called a
certificate or witness), and is checked by a polynomial-time quantum
computation. For some problems, the fact that a quantum proof state could be a
superposition over exponentially many classical states appears to offer
computational advantages over classical proof strings. In the interactive proof
system setting, one may consider a verifier and one or more provers that
exchange and process quantum information rather than classical information
during an interaction for a given input string, giving rise to quantum
complexity classes such as QIP, QSZK, and QMIP* that represent natural quantum
analogues of IP, SZK, and MIP. While quantum interactive proof systems inherit
some properties from their classical counterparts, they also possess distinct
and uniquely quantum features that lead to an interesting landscape of
complexity classes based on variants of this model.
In this survey we provide an overview of many of the known results concerning
quantum proofs, computational models based on this concept, and properties of
the complexity classes they define. In particular, we discuss non-interactive
proofs and the complexity class QMA, single-prover quantum interactive proof
systems and the complexity class QIP, statistical zero-knowledge quantum
interactive proof systems and the complexity class \class{QSZK}, and
multiprover interactive proof systems and the complexity classes QMIP, QMIP*,
and MIP*.Comment: Survey published by NOW publisher
Universally Composable Quantum Multi-Party Computation
The Universal Composability model (UC) by Canetti (FOCS 2001) allows for
secure composition of arbitrary protocols. We present a quantum version of the
UC model which enjoys the same compositionality guarantees. We prove that in
this model statistically secure oblivious transfer protocols can be constructed
from commitments. Furthermore, we show that every statistically classically UC
secure protocol is also statistically quantum UC secure. Such implications are
not known for other quantum security definitions. As a corollary, we get that
quantum UC secure protocols for general multi-party computation can be
constructed from commitments
- …