6,509 research outputs found

    Symmetry-assisted adversaries for quantum state generation

    Full text link
    We introduce a new quantum adversary method to prove lower bounds on the query complexity of the quantum state generation problem. This problem encompasses both, the computation of partial or total functions and the preparation of target quantum states. There has been hope for quite some time that quantum state generation might be a route to tackle the {\sc Graph Isomorphism} problem. We show that for the related problem of {\sc Index Erasure} our method leads to a lower bound of Ω(N)\Omega(\sqrt N) which matches an upper bound obtained via reduction to quantum search on NN elements. This closes an open problem first raised by Shi [FOCS'02]. Our approach is based on two ideas: (i) on the one hand we generalize the known additive and multiplicative adversary methods to the case of quantum state generation, (ii) on the other hand we show how the symmetries of the underlying problem can be leveraged for the design of optimal adversary matrices and dramatically simplify the computation of adversary bounds. Taken together, these two ideas give the new result for {\sc Index Erasure} by using the representation theory of the symmetric group. Also, the method can lead to lower bounds even for small success probability, contrary to the standard adversary method. Furthermore, we answer an open question due to \v{S}palek [CCC'08] by showing that the multiplicative version of the adversary method is stronger than the additive one for any problem. Finally, we prove that the multiplicative bound satisfies a strong direct product theorem, extending a result by \v{S}palek to quantum state generation problems.Comment: 35 pages, 5 figure

    Which groups are amenable to proving exponent two for matrix multiplication?

    Get PDF
    The Cohn-Umans group-theoretic approach to matrix multiplication suggests embedding matrix multiplication into group algebra multiplication, and bounding ω\omega in terms of the representation theory of the host group. This framework is general enough to capture the best known upper bounds on ω\omega and is conjectured to be powerful enough to prove ω=2\omega = 2, although finding a suitable group and constructing such an embedding has remained elusive. Recently it was shown, by a generalization of the proof of the Cap Set Conjecture, that abelian groups of bounded exponent cannot prove ω=2\omega = 2 in this framework, which ruled out a family of potential constructions in the literature. In this paper we study nonabelian groups as potential hosts for an embedding. We prove two main results: (1) We show that a large class of nonabelian groups---nilpotent groups of bounded exponent satisfying a mild additional condition---cannot prove ω=2\omega = 2 in this framework. We do this by showing that the shrinkage rate of powers of the augmentation ideal is similar to the shrinkage rate of the number of functions over (Z/pZ)n(\mathbb{Z}/p\mathbb{Z})^n that are degree dd polynomials; our proof technique can be seen as a generalization of the polynomial method used to resolve the Cap Set Conjecture. (2) We show that symmetric groups SnS_n cannot prove nontrivial bounds on ω\omega when the embedding is via three Young subgroups---subgroups of the form Sk1×Sk2×⋯×SkℓS_{k_1} \times S_{k_2} \times \dotsb \times S_{k_\ell}---which is a natural strategy that includes all known constructions in SnS_n. By developing techniques for negative results in this paper, we hope to catalyze a fruitful interplay between the search for constructions proving bounds on ω\omega and methods for ruling them out.Comment: 23 pages, 1 figur

    A strong direct product theorem for quantum query complexity

    Full text link
    We show that quantum query complexity satisfies a strong direct product theorem. This means that computing kk copies of a function with less than kk times the quantum queries needed to compute one copy of the function implies that the overall success probability will be exponentially small in kk. For a boolean function ff we also show an XOR lemma---computing the parity of kk copies of ff with less than kk times the queries needed for one copy implies that the advantage over random guessing will be exponentially small. We do this by showing that the multiplicative adversary method, which inherently satisfies a strong direct product theorem, is always at least as large as the additive adversary method, which is known to characterize quantum query complexity.Comment: V2: 19 pages (various additions and improvements, in particular: improved parameters in the main theorems due to a finer analysis of the output condition, and addition of an XOR lemma and a threshold direct product theorem in the boolean case). V3: 19 pages (added grant information

    Some upper and lower bounds on PSD-rank

    Get PDF
    Positive semidefinite rank (PSD-rank) is a relatively new quantity with applications to combinatorial optimization and communication complexity. We first study several basic properties of PSD-rank, and then develop new techniques for showing lower bounds on the PSD-rank. All of these bounds are based on viewing a positive semidefinite factorization of a matrix MM as a quantum communication protocol. These lower bounds depend on the entries of the matrix and not only on its support (the zero/nonzero pattern), overcoming a limitation of some previous techniques. We compare these new lower bounds with known bounds, and give examples where the new ones are better. As an application we determine the PSD-rank of (approximations of) some common matrices.Comment: 21 page
    • …
    corecore