Shadow Tomography of Quantum States

Slides:



Advertisements
Similar presentations
Estimating Distinct Elements, Optimally
Advertisements

Quantum Lower Bounds You probably Havent Seen Before (which doesnt imply that you dont know OF them) Scott Aaronson, UC Berkeley 9/24/2002.
The Power of Unentanglement
How Much Information Is In Entangled Quantum States? Scott Aaronson MIT |
The Learnability of Quantum States Scott Aaronson University of Waterloo.
Quantum t-designs: t-wise independence in the quantum world Andris Ambainis, Joseph Emerson IQC, University of Waterloo.
Quantum Versus Classical Proofs and Advice Scott Aaronson Waterloo MIT Greg Kuperberg UC Davis | x {0,1} n ?
Quantum Software Copy-Protection Scott Aaronson (MIT) |
The Future (and Past) of Quantum Lower Bounds by Polynomials Scott Aaronson UC Berkeley.
The Power of Quantum Advice Scott Aaronson Andrew Drucker.
Limitations of Quantum Advice and One-Way Communication Scott Aaronson UC Berkeley IAS Useful?
How Much Information Is In A Quantum State? Scott Aaronson MIT |
Quantum Double Feature Scott Aaronson (MIT) The Learnability of Quantum States Quantum Software Copy-Protection.
A Full Characterization of Quantum Advice Scott Aaronson Andrew Drucker.
New Evidence That Quantum Mechanics Is Hard to Simulate on Classical Computers Scott Aaronson Parts based on joint work with Alex Arkhipov.
Pretty-Good Tomography Scott Aaronson MIT. Theres a problem… To do tomography on an entangled state of n qubits, we need exp(n) measurements Does this.
How to Solve Longstanding Open Problems In Quantum Computing Using Only Fourier Analysis Scott Aaronson (MIT) For those who hate quantum: The open problems.
Scott Aaronson Institut pour l'Étude Avançée Le Principe de la Postselection.
QMA/qpoly PSPACE/poly: De-Merlinizing Quantum Protocols Scott Aaronson University of Waterloo.
The Equivalence of Sampling and Searching Scott Aaronson MIT.
New Computational Insights from Quantum Optics Scott Aaronson.
Solving Hard Problems With Light Scott Aaronson (Assoc. Prof., EECS) Joint work with Alex Arkhipov vs.
Short seed extractors against quantum storage Amnon Ta-Shma Tel-Aviv University 1.
Quantum Money from Hidden Subspaces Scott Aaronson and Paul Christiano.
Approximate List- Decoding and Hardness Amplification Valentine Kabanets (SFU) joint work with Russell Impagliazzo and Ragesh Jaiswal (UCSD)
Quantum Computing MAS 725 Hartmut Klauck NTU
1 Introduction to Quantum Information Processing QIC 710 / CS 667 / PH 767 / CO 681 / AM 871 Richard Cleve DC 2117 / RAC 2211 Lecture.
Superdense coding. How much classical information in n qubits? Observe that 2 n  1 complex numbers apparently needed to describe an arbitrary n -qubit.
Foundations of Privacy Lecture 11 Lecturer: Moni Naor.
1 Introduction to Quantum Information Processing QIC 710 / CS 768 / PH 767 / CO 681 / AM 871 Richard Cleve QNC 3129 Lecture 18 (2014)
1 Introduction to Quantum Information Processing QIC 710 / CS 667 / PH 767 / CO 681 / AM 871 Richard Cleve DC 2117 Lecture 16 (2011)
8.4.2 Quantum process tomography 8.5 Limitations of the quantum operations formalism 量子輪講 2003 年 10 月 16 日 担当:徳本 晋
1 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 467 / Phys 767 C&O 481 / C&O 681 Richard Cleve DC 3524 Course.
An Introduction to Quantum Computation Sandy Irani Department of Computer Science University of California, Irvine.
1 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 667 / Phys 767 C&O 481 / C&O 681 Richard Cleve DC 2117 Lecture.
Random Access Codes and a Hypercontractive Inequality for
Scott Aaronson (UT Austin)
Property Testing (a.k.a. Sublinear Algorithms )
PAC-Learning and Reconstruction of Quantum States
Probabilistic Algorithms
The complexity of the Separable Hamiltonian Problem
Information Complexity Lower Bounds
Richard Cleve DC 2117 Introduction to Quantum Information Processing CS 667 / PH 767 / CO 681 / AM 871 Lecture 16 (2009) Richard.
Complexity-Theoretic Foundations of Quantum Supremacy Experiments
Introduction to Randomized Algorithms and the Probabilistic Method
Scott Aaronson (UT Austin)
On the Size of Pairing-based Non-interactive Arguments
A low cost quantum factoring algorithm
The first Few Slides stolen from Boaz Barak
CSCE 411 Design and Analysis of Algorithms
Shadow Tomography of Quantum States
Scott Aaronson (UT Austin) MIT, November 20, 2018
New Results on Learning and Reconstruction of Quantum States
New Results on Learning and Reconstruction of Quantum States
Certified Randomness from Quantum Supremacy Scott Aaronson (UT Austin)
General Strong Polarization
New Results on Learning and Reconstruction of Quantum States
Chapter 11 Limitations of Algorithm Power
Quantum Computing and the Quest for Quantum Computational Supremacy
Online Learning of Quantum States Scott Aaronson (UT Austin)
Complexity-Theoretic Foundations of Quantum Supremacy Experiments
Gentle Measurement of Quantum States and Differential Privacy
The Computational Complexity of Decoding Hawking Radiation
Classical Algorithms from Quantum and Arthur-Merlin Communication Protocols Lijie Chen MIT Ruosong Wang CMU.
Scott Aaronson (UT Austin) UNM, Albuquerque, October 18, 2018
Quantum Computing Joseph Stelmach.
Richard Cleve DC 2117 Introduction to Quantum Information Processing CS 667 / PH 767 / CO 681 / AM 871 Lecture 16 (2009) Richard.
Gentle Measurement of Quantum States and Differential Privacy *
Quantum Lower Bounds Via Laurent Polynomials
Richard Cleve DC 3524 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 667 / Phys 767 C&O 481 / C&O 681 Lecture.
Presentation transcript:

Shadow Tomography of Quantum States  Scott Aaronson (University of Texas at Austin) STOC, Los Angeles, June 26, 2018

Measurements in QM are Destructive One qubit has infinitely many bits in the amplitudes ,—but when you measure, the state “collapses” to just 1 bit! (0 with probability ||2, 1 with probability ||2) This destructiveness opens cryptographic possibilities, like quantum key distribution and quantum money—but it’s also a huge practical limitation!

And there’s a lot to be destroyed And there’s a lot to be destroyed! An n-qubit pure state requires 2n complex numbers to specify, even approximately: Yet measuring yields at most n bits (Holevo’s Theorem) So should we say that the 2n complex numbers are “really there” in a single copy of |—or “just in our heads”? A probability distribution over n-bit strings also involves 2n real numbers. But probabilities don’t interfere!

Interlude: Mixed States DD Hermitian positive semidefinite matrix with Tr()=1 The most general kind of state in QM: encodes (everything measurable about) a distribution where each superposition |i occurs with probability pi A yes-or-no measurement can be represented by a DD Hermitian psd matrix E with all eigenvalues in [0,1] The measurement “accepts”  with probability Tr(E), and “rejects”  with probability 1-Tr(E)

Quantum State Tomography Task: Given lots of copies of an unknown D-dimensional quantum mixed state , produce an approximate classical description of  O’Donnell and Wright and Haah et al., STOC’2016: ~(D2) copies of  are necessary and sufficient for this Experimental Record: Song et al. (2017), 10 qubits, millions of measurement settings! Keep in mind: D = 2n

Shadow Tomography Given: Unknown D-dimensional mixed state , known 2- outcome measurements E1,…,EM Goal: Estimate Tr(Ei) to within additive error , for every i[M], with (say) 2/3 success probability How many copies of  must we measure? Clearly Õ(D2) copies suffice, and also Õ(M) copies. But what about poly(log D, log M)? Main Result: It’s possible to do Shadow Tomography using only copies Doesn’t this violate Holevo’s Theorem? Nope…

Implications Given an n-qubit state |, for any fixed polynomial p, by measuring nO(1) copies of |, we can learn |’s behavior on every accepting/rejecting circuit with p(n) gates Any scheme for quantum money (with small secret) or quantum software copy protection must require computational assumptions Given any language in PromiseBQP/qpoly, nO(1) copies of the advice state are enough to reconstruct the whole truth table on n-bit inputs … even without knowing the promise! (Can also phrase in terms of quantum 1-way communication protocols) Any experimental use???

Interlude: Gentle Measurement Winter 1999, A. 2004, Wilde 2013 Suppose a measurement of a mixed state  yields a certain outcome with probability 1- Then after the measurement, we still have a state ’ that’s -close to  in trace distance Moreover, we can apply M such measurements in succession, and they’ll all accept w.p. 1-2M Often combined with amplification: measure k copies of  and take a majority to push down error by 1/exp(k)

Why Doesn’t Gentle Measurement Immediately Solve the Problem? Implies a promise gap version of shadow tomography: Given measurements E1,…,EM and real numbers c1,…,cM, and promised that for each i, either Tr(Ei)ci or Tr(Ei)ci-, we can decide which for every i using only O(log M / 2) copies of  When there’s no promise, we can never rule out that we’re on the knife-edge between acceptance and rejection—in which case, measuring  is dangerous! Our main contribution is to solve this

The proof combines several ingredients The proof combines several ingredients. The first is a “postselected learning theorem” (A. 2004) 2 3 1 I Key point: for boosting / multiplicative weights type reasons, this process must converge after T = O(log D*) iterations, at some state T that behaves like  on E1,…,EM (even if it’s far from  in trace distance) Alice is trying to describe a mixed state  to Bob (actually an amplified version), with respect to its behavior on E1,…,EM Initially, Bob knows nothing about , so he guesses it’s the maximally mixed state 0=I (actually ) Then Alice helps Bob improve, by repeatedly telling him a measurement Ei(t) on which his current guess t-1 badly fails Bob lets t be the state obtained by starting from t-1, then performing Ei(t) and postselecting on getting the right outcome Previously used to prove BQP/qpoly  PP/poly and to do online learning of quantum states (A. et al. 2017)

Alas, postselected learning doesn’t suffice by itself for shadow tomography, because it gives us no idea how to find the informative measurements Ei(1),Ei(2),…. So we need to combine with another result called the… Quantum OR Bound Let  be an unknown mixed state, and let E1,…,EM be known 2-outcome measurements. Suppose we’re promised that either there exists an i such that Tr(Ei)c, or else Tr(Ei)c- for all i[M]. Then we can decide which, with high probability, given only O((log M)/2) copies of 

[A. 2006] claimed a proof of the Quantum OR Bound, based on just applying amplified Ei’s in a random order [Harrow-Lin-Montanaro, SODA’2017] discovered an error in my proof—but also fixed it! Using a procedure that involves preparing a control qubit in the |+ state, applying Ei’s conditional on the control qubit being |1, and repeatedly measuring the control qubit to see whether it’s decohered It remains open whether my original, simpler procedure is also sound Using binary search, can boost the OR Bound to a “gentle search procedure,” which actually finds an Ei that accepts  w.h.p. using O(log4M) copies of 

True Sample Complexity of Shadow Tomography? Best lower bound I could prove (which holds even in the classical case): Open whether any dependence on D is needed! [A.-Rothblum, not yet published]: Using a brand-new connection between gentle measurement and differential privacy (!), we can improve the dependence on log M, while also making shadow tomography “online”

Computation Cost of Shadow Tomography? Our procedure uses Õ(LM) + DO(log log D) time, where L is the circuit complexity of implementing a single Ei Brandão et al. 2017: By combining our ideas with recent SDP algorithms, achieve shadow tomography with poly(log M, log D) copies and Õ(LM) + DO(1) time Note: Even writing the input takes ~MD2 bits, and output takes ~M bits, unless we use implicit representations If “hyper-efficient” shadow tomography is possible (poly(log M, log D) time), then BQP/qpoly=BQP/poly and there’s no quantum copy-protection But can we do it in special cases?