Lower Bounds for Collision and Distinctness with Small Range By: Andris Ambainis {medv, Mar 17, 2004.

Slides:



Advertisements
Similar presentations
Quantum Lower Bounds You probably Havent Seen Before (which doesnt imply that you dont know OF them) Scott Aaronson, UC Berkeley 9/24/2002.
Advertisements

Quantum Lower Bound for the Collision Problem Scott Aaronson 1/10/2002 quant-ph/ I was born at the Big Bang. Cool! We have the same birthday.
Quantum Lower Bounds The Polynomial and Adversary Methods Scott Aaronson September 14, 2001 Prelim Exam Talk.
Quantum Software Copy-Protection Scott Aaronson (MIT) |
The Future (and Past) of Quantum Lower Bounds by Polynomials Scott Aaronson UC Berkeley.
SPEED LIMIT n Quantum Lower Bounds Scott Aaronson (UC Berkeley) August 29, 2002.
Lower Bounds for Local Search by Quantum Arguments Scott Aaronson.
Limitations of Quantum Advice and One-Way Communication Scott Aaronson UC Berkeley IAS Useful?
Quantum Search of Spatial Regions Scott Aaronson (UC Berkeley) Joint work with Andris Ambainis (U. Latvia)
On the degree of symmetric functions on the Boolean cube Joint work with Amir Shpilka.
Orthogonal Drawing Kees Visser. Overview  Introduction  Orthogonal representation  Flow network  Bend optimal drawing.
Efficient Discrete-Time Simulations of Continuous- Time Quantum Query Algorithms QIP 2009 January 14, 2009 Santa Fe, NM Rolando D. Somma Joint work with.
Outline. Theorem For the two processor network, Bit C(Leader) = Bit C(MaxF) = 2[log 2 ((M + 2)/3.5)] and Bit C t (Leader) = Bit C t (MaxF) = 2[log 2 ((M.
Having Proofs for Incorrectness
Polynomial Time Approximation Schemes Presented By: Leonid Barenboim Roee Weisbert.
The number of edge-disjoint transitive triples in a tournament.
1 By Gil Kalai Institute of Mathematics and Center for Rationality, Hebrew University, Jerusalem, Israel presented by: Yair Cymbalista.
Barry C. Sanders Institute for Quantum Information Science, University of Calgary with G Ahokas (Calgary), D W Berry (Macquarie), R Cleve (Waterloo), P.
1 Introduction to Computability Theory Lecture12: Reductions Prof. Amos Israeli.
Chapter 5 Orthogonality
Analysis of Boolean Functions Fourier Analysis, Projections, Influence, Junta, Etc… And (some) applications Slides prepared with help of Ricky Rosen.
An Algorithm for Polytope Decomposition and Exact Computation of Multiple Integrals.
Quantum Error Correction Michele Mosca. Quantum Error Correction: Bit Flip Errors l Suppose the environment will effect error (i.e. operation ) on our.
Co-operative Private Equality Test(CPET) Ronghua Li and Chuan-Kun Wu (received June 21, 2005; revised and accepted July 4, 2005) International Journal.
6/20/2015List Decoding Of RS Codes 1 Barak Pinhas ECC Seminar Tel-Aviv University.
Dean H. Lorenz, Danny Raz Operations Research Letter, Vol. 28, No
Algebraic numbers I Based on Burnikel, Fleischer, Mehlhorn, Schirra article: A Strong and Easily Computable Separation Bound for Arithmetic Expressions.
Near-Optimal Network Design with Selfish Agents By Elliot Anshelevich, Anirban Dasgupta, Eva Tardos, Tom Wexler STOC’03 Presented by Mustafa Suleyman CIFTCI.
Boolean Unification EE219B Presented by: Jason Shamberger March 1, 2000.
Job Scheduling Lecture 19: March 19. Job Scheduling: Unrelated Multiple Machines There are n jobs, each job has: a processing time p(i,j) (the time to.
Quantum Algorithms II Andrew C. Yao Tsinghua University & Chinese U. of Hong Kong.
A Brief Introduction To The Theory of Computer Science and The PCP Theorem By Dana Moshkovitz Faculty of Mathematics and Computer Science The Weizmann.
Scott Aaronson (MIT) Andris Ambainis (U. of Latvia) Forrelation: A Problem that Optimally Separates Quantum from Classical Computing H H H H H H f |0 
Using Areas to Approximate to Sums of Series In the previous examples it was shown that an area can be represented by the sum of a series. Conversely the.
6 6.3 © 2012 Pearson Education, Inc. Orthogonality and Least Squares ORTHOGONAL PROJECTIONS.
ON MULTIVARIATE POLYNOMIAL INTERPOLATION
1 Joint work with Shmuel Safra. 2 Motivation 3 Motivation.
1 Algorithms for Large Data Sets Ziv Bar-Yossef Lecture 13 June 22, 2005
Ch. 8 & 9 – Linear Sorting and Order Statistics What do you trade for speed?
1 資訊科學數學 14 : Determinants & Inverses 陳光琦助理教授 (Kuang-Chi Chen)
New quantum lower bound method, with applications to direct product theorems Andris Ambainis, U. Waterloo Robert Spalek, CWI, Amsterdam Ronald de Wolf,
Asymptotics Data Structures & OO Development I 1 Computer Science Dept Va Tech June 2006 ©2006 McQuain & Ribbens Big-O Analysis Order of magnitude analysis.
Introduction to Proofs
Approximation schemes Bin packing problem. Bin Packing problem Given n items with sizes a 1,…,a n  (0,1]. Find a packing in unit-sized bins that minimizes.
4 4.2 © 2012 Pearson Education, Inc. Vector Spaces NULL SPACES, COLUMN SPACES, AND LINEAR TRANSFORMATIONS.
Quantum Computing MAS 725 Hartmut Klauck NTU TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: A A A A.
Matrices CHAPTER 8.1 ~ 8.8. Ch _2 Contents  8.1 Matrix Algebra 8.1 Matrix Algebra  8.2 Systems of Linear Algebra Equations 8.2 Systems of Linear.
NP Complexity By Mussie Araya. What is NP Complexity? Formal Definition: NP is the set of decision problems solvable in polynomial time by a non- deterministic.
Logic Circuits Chapter 2. Overview  Many important functions computed with straight-line programs No loops nor branches Conveniently described with circuits.
The Integers. The Division Algorithms A high-school question: Compute 58/17. We can write 58 as 58 = 3 (17) + 7 This forms illustrates the answer: “3.
Chapter 2 Mathematical preliminaries 2.1 Set, Relation and Functions 2.2 Proof Methods 2.3 Logarithms 2.4 Floor and Ceiling Functions 2.5 Factorial and.
Computing Eigen Information for Small Matrices The eigen equation can be rearranged as follows: Ax = x  Ax = I n x  Ax - I n x = 0  (A - I n )x = 0.
Solving a System of Equations by SUBSTITUTION. GOAL: I want to find what x equals, and what y equals. Using substitution, I can say that x = __ and y.
Communication vs. Computation S Venkatesh Univ. Victoria Presentation by Piotr Indyk (MIT) Kobbi Nissim Microsoft SVC Prahladh Harsha MIT Joe Kilian NEC.
1 Example 2 (a) Find the range of f(x) = x 2 +1 with domain [0,2]. Solution The function f is increasing on the interval [0,2] from its smallest value.
Elementary Linear Algebra Anton & Rorres, 9 th Edition Lecture Set – 07 Chapter 7: Eigenvalues, Eigenvectors.
The least known length of ordered basis of symmetric group S. A. Kalinchuk, Yu. L. Sagalovich Institute for Information Transmission Problems, Russian.
Linear Program Set Cover. Given a universe U of n elements, a collection of subsets of U, S = {S 1,…, S k }, and a cost function c: S → Q +. Find a minimum.
A Optimal On-line Algorithm for k Servers on Trees Author : Marek Chrobak Lawrence L. Larmore 報告人:羅正偉.
Asymptotics and Recurrence Equations Prepared by John Reif, Ph.D. Analysis of Algorithms.
Computing Boolean Functions: Exact Quantum Query Algorithms and Low Degree Polynomials Alina Dubrovska, Taisia Mischenko-Slatenkova University of Latvia.
Forrelation: A Problem that Optimally Separates Quantum from Classical Computing.
Quantum algorithms are at most polynomially faster for any symmetric function Andris Ambainis University of Latvia.
Fidelity of a Quantum ARQ Protocol Alexei Ashikhmin Bell Labs  Classical Automatic Repeat Request (ARQ) Protocol  Quantum Automatic Repeat Request (ARQ)
Copyright © Cengage Learning. All rights reserved. CHAPTER 8 RELATIONS.
CS104:Discrete Structures Chapter 2: Proof Techniques.
Testing Low-Degree Polynomials over GF(2) Noga AlonSimon LitsynMichael Krivelevich Tali KaufmanDana Ron Danny Vainstein.
Quantum Computation Stephen Jordan. Church-Turing Thesis ● Weak Form: Anything we would regard as “computable” can be computed by a Turing machine. ●
Separations inQuery Complexity Pointer Functions Basedon Andris Ambainis University of Latvia Joint work with: Kaspars Balodis, Aleksandrs Belovs Troy.
Fuw-Yi Yang1 Textbook: Introduction to Cryptography 2nd ed. By J.A. Buchmann Chap 1 Integers Department of Computer Science and Information Engineering,
Presentation transcript:

Lower Bounds for Collision and Distinctness with Small Range By: Andris Ambainis {medv, Mar 17, 2004

Agenda Introduction Preliminaries Results Conclusion

Introduction

l Given a function l Check if its one-to-one or two-to one l Classical solution is queries l Quantum upper bound [1] is l Quantum low bound [2] is if Collision problem

l Given a function l Check if there are l Quant. low bound [2] is if l Quant. low bound [3] is if Distinctness problem

Preliminaries

Polynomial lower bounds l We can describe by NxM Boolean variables which are 1 if and 0 otherwise l We say that a polynomial P approximates the function if

Polynomial degree – Lemma 1 Lemma 1 [4]: If a quantum algorithm computes φ with bounded error using T queries then there is a polynomial P(y 11,…,y NM ) of degree at most 2T that approximates φ.

l Definition: is symmetric function if for any Symmetric function

Results

New polynomial representation l A new representation of function f: l z =(z 1,…,z M ); z j = #i [N] s.t. f(i)=j l We say that a polynomial Q approximates the function if

l The following two statements are equivalent: 1. There is exists a polynomial Q of degree at most k in approximating 2. There is exists a polynomial P of degree at most k in approximating Lemma 2

Lemma 2 Proof Outline (1  2) For a given y set z j = y 1j + … +y Nj and substitute into Q(z) to obtain P(y) of the same degree

Lemma 2 Proof Outline (2  1) For a given P(y), define Q(z) = E[P(y)] for a random y = (y 11, …,y NM ) consistent with z = (z 1, …,z M ) (i.e., z j = ∑y ij ) It can be shown that Q is a polynomial of the same degree in z 1, …,z M Since φ is symmetric, φ(f) is the same for any f with same z; thus if P(y)≈ φ(f) then Q(z)≈ φ(f)

Theorem 2 (main result) Let φ be symmetric. Let φ’ be restriction of φ to f: [N]  [N]. Then the minimum degree of polynomial P(y 11,…,y NM ) approximating φ is equal to the minimum degree of P’(y 11,…,y NN ) approximating φ’.

Theorem 2 Proof Outline - 1 Obviously, deg(P’ ) ≤ deg(P) For a given P’(y’) construct Q’(z’), then construct Q(z) from Q’(z’), and P(y) from Q(z) Constructing Q from Q’:

Constructing Q from Q’ Since Q ’ is symmetric, it is a sum of symmetric polynomials Q will be the sum of same symmetric polynomials in variables z1, …,zM

1. Consider input function f 2. In at most N are nonzero 3. Consider permutation 4. Such that only the first N elements are non-zero Q approximates φ

Q approximates φ – cont. By construction, Hence Q approximates φ, Q.E.D.

Conclusion

l Low bound for symmetric function already found for is valid for Paper conclusions

Related papers 1. Quantum Algorithm for the Collision Problem Authors: Gilles Brassard, Peter Hoyer, Alain TappGilles BrassardPeter HoyerAlain Tapp 2. Quantum lower bounds for the collision and the element distinctness problems Authors: Yaoyun ShiYaoyun Shi 3. Quantum Algorithms for Element Distinctness Authors: Harry Buhrman, Christoph Durr, Mark Heiligman, Peter Hoyer, Frederic Magniez, Miklos Santha, Ronald de WolfHarry BuhrmanChristoph DurrMark Heiligman Peter HoyerFrederic MagniezMiklos SanthaRonald de Wolf 4. Quantum Lower Bounds by Polynomials Authors: Robert Beals (U of Arizona), Harry Buhrman (CWI), Richard Cleve (U of Calgary), Michele Mosca (U of Oxford), Ronald de Wolf (CWI and U of Amsterdam)Robert BealsHarry BuhrmanRichard CleveMichele MoscaRonald de Wolf