Download presentation

Presentation is loading. Please wait.

Published byJeremy Lappin Modified over 2 years ago

1
P LAYING ( QUANTUM ) GAMES WITH OPERATOR SPACES David Pérez-García Universidad Complutense de Madrid Bilbao 8-Oct-2011

2
O UR GROUP 2 postdoctoral research positions opened in our group “Mathematics and Quantum Information”.

3
S TRUCTURE OF THE TALK The object under study: 2P1R games Examples. Why are they important? Complexity theory I. Inaproximability results. Complexity theory II. Parallel computation. Position based cryptography. Certifiable random number generation. A bit (just one bit!) of history. Where are the maths? Our contribution. Operator Spaces.

4
2P1R GAMES

5
x y a b 1.A set of possible questions for Alice and Bob (denoted by x,y resp.). 2.A known probability distribution for the questions. 3.A known boolean function V(x,y,a,b) which decides, based on questions and answers a,b, whether they witn (=1) or loose (=0) the game. 4.A limitation in the communication between Alice and Bob.

6
2P1R GAMES x y a b The value of the game is the largest probability of wining the game while optimizing over the possible strategies of Alice and Bob. It is assumed that Alice and Bob have free communication BEFORE the game to coordinate an strategy. Hence strategies can involve shared randomness (classical value of the game) or quantum entanglement (quantum value of the game) depending on the resources of Alice and Bob.

7
2P1R GAMES xy a b What is an strategy? A probability distribution p(ab|xy) Which are the possible strategies in the classical case? And in the quantum one?

8
EXAMPLES. I NAPROXIMABILITY

9
EXAMPLES. I NAPROXIMABILITY RESULTS Theorem (PCP theorem (Arora-Safra, 92)+ Parallel repetition (Raz, 94)): Unless P=NP, given e>0 and a polynomial algorithm to determine the classical value of a game, there exist games for which the value is 1 and the algorithm outputs a value

10
E XAMPLES. I NAPROXIMABILITY RESULTS It is the mother of most inaproximability results. For instance: Theorem (Hastad, 1999): Unless P=NP, given e>0 and a polynomial algorithm to determine the MAX-CLIQUE of a graph, there exist graphs of n vertices for which Note that MAX-CLIQUE is always less or equal than n (!!)

11
E XAMPLES. I NAPROXIMABILITY RESULTS Connection with 2P1R games. Via LABEL-COVER. Given a bipartite graph And a set of colors And a set of valid configurations for each edge Find a coloring of the graph which maximizes the number of edges with a valid configuration.

12
E XAMPLES. I NAPROXIMABILITY RESULTS Connection with 2P1R games. Via LABEL-COVER. Colors Number of valid edges = 4 Solution to LABEL-COVER = 5

13
E XAMPLES. I NAPROXIMABILITY RESULTS Connection with 2P1R games. Via LABEL-COVER. Given and instance of LABEL-COVER, we define a 2P1R game by: Questions = vertices (from U to Alice and from W to Bob) with uniform probability between the pairs which conform an edge (and 0 in the rest). Answers = colors. They win the game if they give a valid coloring for the edge which is asked.

14
E XAMPLES. P ARALLEL COMPUTATION

15
Given a boolean function f(x,y), minimize c in: xy c bits of communication f(x,y)

16
E XAMPLES. P OSITION BASED CRYPTOGRAPHY. ( CHANDRAN ET AL, 2009)

17
E XAMPLES. P OSITION BASED CRYPTOGRAPHY 1D for simplicity xy a b AIM : That only someone in position P could answer with probability 1 to the challenge. It would allow unconditional secure communication !!! Coordinated Position P

18
E XAMPLES. P OSITION BASED CRYPTOGRAPHY Relation with 2P1R games. Since the verifiers act coordinated, we can assume there is just one of them. Based on answering times, we have: x y a b Communication “independent-one-way”

19
E XAMPLES. P OSITION BASED CRYPTOGRAPHY Hence, the aim is to find a challenge which can be won always with arbitrary communication (all classical challenges are like that) but not with “independent-one-way” communication. x y a b The honest case is the one of arbitrary communication, since there is only a single prover.

20
E XAMPLES. P OSITION BASED CRYPTOGRAPHY This is impossible classically. Both models of communication are the same. To see it, just copy and send the received question. In the quantum case (with no entanglement) it is indeed possible (Buhrman et al., 2010). The key idea lies on the fact that it is NOT possible to copy quantum states by the NO- CLONING theorem. Question: Is it also possible when a polynomial amount of entanglement is allowed? Partial answers (Beigi et al., Burhman et al, 2011): LINEAR = YES, EXPONENTIAL = NO.

21
E XAMPLES. R ANDOM NUMBER GENERATION ( PIRONIO ET AL., 2010)

22
E XAMPLE. R ANDOM NUMBER GENERATION PROBLEM: How to construct an apparatus which generates perfect random numbers (and hence secret) in a certifiable way? 001110101001010101 ….. could have a copy of 001110101001010101….. But in quantum mechanics copying is not allowed !!!

23
E XAMPLE. R ANDOM NUMBER GENERATION Theorem (Pironio et al., Colbeck et al., 2010): If (after many rounds in the game) one gets a value strictly larger than the classical one, there is a classical “deterministic” post-processing of the outputs a, b which produces numbers which are perfectly random and secret. xy a b DONE EXPERIMENTALLY ALREADY !!!

24
E XAMPLE. R ANDOM NUMBER GENERATION The key is, hence, the existence of quantum strategies which are NOT classical. This guarantees an intrinsic randomness. Classical Quantum Non- signaling

25
HISTORICAL NOTE The existence of this intrinsic randomness is precisely what Einstein did not believe in his criticism of quantum mechanics in the 30’s. The first experiment showing that, indeed, this randomness does ocurr was done by A. Aspect in the 80’s. The experiment was based precisely on the analysis of the value of a particular game, known as CHSH (Clauser, Horne, Shimony, Holt).

26
O UR CONTRIBUTION

27
T HE PROBLEM WE WANT TO ATTACK Estimate D. Parameters: Number of questions = N Number of answers = M Size (dimension) of the quantum system = d D Quantum strategies Classical strategies How large can D be?

28
V IOLATION OF A BELL INEQUALITY. F ORMAL DEFINITION OF D. Bell inquality T BELL INEQUALITY= 2P1R GAME (generalized)

29
O PERATIONAL INTERPRETATION OF D Bell Inequality T Where p is the maximum (classical) noise which a quantum strategy can withstand before getting classical. It is hence desirable to have a large D. How does D scale with the parameters N,M, d?

30
MAIN THEOREM Theorem (Junge, Palazuelos, Pérez-García, Villanueva, Wolf, CMP + PRL, 2010). D can be arbitrarily large, This requires: N= D^2 M= EXP(D) d= D^2 Theorem (Junge, Palazuelos, CMP, 2011). D can be arbitrarily large, This requires: N= D^2, M= D^2, d= D^2 Recent improvements Theorem (Buhrman et al, 2011). D can be arbitrarily large, This requires: N= D, M= EXP(D), d= D.

31
A N INTERESTING APPLICATION Theorem (Junge, Palazuelos, Pérez-García, Villanueva, Wolf, CMP + PRL, 2010). There exist quantum estrategies with EXP(N) questions, N answers and dimension of the quantum system N which need the communication of log(N) bits to be simulated classically. Quantum entanglement can save communication!!!

32
T HE TOOLS : O PERATOR SPACES

33
O PERATOR S PACES An operator space is a complex vector space E with a sequence of norms defined on such that: Given a C*-algebra, there exists a unique norm which makes a C*-algebra. With these norms, A is an operator space.

34
O PERATOR SPACES In particular: Given

35
O PERATOR SPACES The morphisms in this category are the completely bounded maps: CB(E,F) is an operator space via In particular E* is an operator space

36
C ONNECTION WITH THE 2P1R GAMES Theorem (Junge, Palazuelos, Pérez-García, Villanueva, Wolf, CMP + PRL, 2010). Given a 2P1R game (or more generally a Bell inequality) The classical value is given (with the order a,x,b,y) by the norm: The quantum value, by the norm:

37
Operator Spaces are the natural mathematical framework to analyze 2P1R games. Some references in this direction: 1.D. Pérez-García, M.M. Wolf, C. Palazuelos, I. Villanueva, M. Junge, Unbounded violations of Bell inequalities, Comm. Math. Phys. 279, 455 (2008) 2.M. Junge, C. Palazuelos, D. Pérez-García, I. Villanueva, M.M. Wolf, Operator Space theory: a natural framework for Bell inequalities, Phys. Rev. Lett. 104, 170405 (2010). 3.M. Junge, C. Palazuelos, D. Pérez-García, I. Villanueva, M.M. Wolf, Unbounded violations of bipartite Bell Inequalities via Operator Space theory, Comm. Math. Phys. 300, 715–739 (2010). 4.M. Junge, M. Navascués, C. Palazuelos, D. Pérez-García, V.B. Scholtz, R.F. Werner, Connes' embedding problem and Tsirelson's problem, J. Math. Phys. 52, 012102 (2011) 5.A.Salles, D. Cavalcanti, A. Acín, D. Pérez-García., M.M. Wolf, Bell inequalities from multilinear contractions, Quant. Inf. Comp. 10, 0703-0719 (2010). 6.M. Junge, C. Palazuelos, Large violation of Bell inequalities with low entanglement, Comm. Math. Phys. 306 (3), 695-746 (2011). W HAT WE LEARNT

Similar presentations

OK

Quantum Cryptography Christian Schaffner Research Center for Quantum Software Institute for Logic, Language and Computation (ILLC) University of Amsterdam.

Quantum Cryptography Christian Schaffner Research Center for Quantum Software Institute for Logic, Language and Computation (ILLC) University of Amsterdam.

© 2017 SlidePlayer.com Inc.

All rights reserved.

Ads by Google

Ppt on total internal reflection occurs Ppt on modern art Ppt on transportation in plants for class 7 Ppt on social networking sites facebook Ppt on cross docking meaning Ppt on viruses and anti viruses for computer Ppt on series and parallel circuits interactive Ppt on different internet services Ppt on eddy current loss Ppt on low level language vs high level