The Limits of Quantum Computers (or: What We Cant Do With Computers We Dont Have) Scott Aaronson University of Waterloo BQP NP- complete SZK.

Slides:



Advertisements
Similar presentations
1 Radio Maria World. 2 Postazioni Transmitter locations.
Advertisements

EcoTherm Plus WGB-K 20 E 4,5 – 20 kW.
Números.
Trend for Precision Soil Testing % Zone or Grid Samples Tested compared to Total Samples.
Trend for Precision Soil Testing % Zone or Grid Samples Tested compared to Total Samples.
AGVISE Laboratories %Zone or Grid Samples – Northwood laboratory
Trend for Precision Soil Testing % Zone or Grid Samples Tested compared to Total Samples.
PDAs Accept Context-Free Languages
ALAK ROY. Assistant Professor Dept. of CSE NIT Agartala
Reflection nurulquran.com.
EuroCondens SGB E.
Worksheets.
The Future (and Past) of Quantum Lower Bounds by Polynomials Scott Aaronson UC Berkeley.
& dding ubtracting ractions.
Limits on Efficient Computation in the Physical World Dissertation Talk Scott Aaronson.
The Limits of Quantum Computers (or: What We Can’t Do With Computers We Don’t Have) Scott Aaronson (MIT) NP-complete SZK BQP.
Sequential Logic Design
STATISTICS Linear Statistical Models
Addition and Subtraction Equations
By John E. Hopcroft, Rajeev Motwani and Jeffrey D. Ullman
1 When you see… Find the zeros You think…. 2 To find the zeros...
Western Public Lands Grazing: The Real Costs Explore, enjoy and protect the planet Forest Guardians Jonathan Proctor.
EQUS Conference - Brussels, June 16, 2011 Ambros Uchtenhagen, Michael Schaub Minimum Quality Standards in the field of Drug Demand Reduction Parallel Session.
Add Governors Discretionary (1G) Grants Chapter 6.
CALENDAR.
CHAPTER 18 The Ankle and Lower Leg
Introduction to Turing Machines
ASCII stands for American Standard Code for Information Interchange
The 5S numbers game..
突破信息检索壁垒 -SciFinder Scholar 介绍
A Fractional Order (Proportional and Derivative) Motion Controller Design for A Class of Second-order Systems Center for Self-Organizing Intelligent.
Numerical Analysis 1 EE, NCKU Tien-Hao Chang (Darby Chang)
The basics for simulations
Factoring Quadratics — ax² + bx + c Topic
EE, NCKU Tien-Hao Chang (Darby Chang)
MM4A6c: Apply the law of sines and the law of cosines.
Figure 3–1 Standard logic symbols for the inverter (ANSI/IEEE Std
TCCI Barometer March “Establishing a reliable tool for monitoring the financial, business and social activity in the Prefecture of Thessaloniki”
1 Prediction of electrical energy by photovoltaic devices in urban situations By. R.C. Ott July 2011.
Dynamic Access Control the file server, reimagined Presented by Mark on twitter 1 contents copyright 2013 Mark Minasi.
TCCI Barometer March “Establishing a reliable tool for monitoring the financial, business and social activity in the Prefecture of Thessaloniki”
Copyright © [2002]. Roger L. Costello. All Rights Reserved. 1 XML Schemas Reference Manual Roger L. Costello XML Technologies Course.
Progressive Aerobic Cardiovascular Endurance Run
MaK_Full ahead loaded 1 Alarm Page Directory (F11)
TCCI Barometer September “Establishing a reliable tool for monitoring the financial, business and social activity in the Prefecture of Thessaloniki”
Artificial Intelligence
When you see… Find the zeros You think….
2011 WINNISQUAM COMMUNITY SURVEY YOUTH RISK BEHAVIOR GRADES 9-12 STUDENTS=1021.
Before Between After.
2011 FRANKLIN COMMUNITY SURVEY YOUTH RISK BEHAVIOR GRADES 9-12 STUDENTS=332.
2.10% more children born Die 0.2 years sooner Spend 95.53% less money on health care No class divide 60.84% less electricity 84.40% less oil.
Subtraction: Adding UP
Numeracy Resources for KS2
1 Non Deterministic Automata. 2 Alphabet = Nondeterministic Finite Accepter (NFA)
Static Equilibrium; Elasticity and Fracture
Resistência dos Materiais, 5ª ed.
Lial/Hungerford/Holcomb/Mullins: Mathematics with Applications 11e Finite Mathematics with Applications 11e Copyright ©2015 Pearson Education, Inc. All.
WARNING This CD is protected by Copyright Laws. FOR HOME USE ONLY. Unauthorised copying, adaptation, rental, lending, distribution, extraction, charging.
UNDERSTANDING THE ISSUES. 22 HILLSBOROUGH IS A REALLY BIG COUNTY.
9. Two Functions of Two Random Variables
A Data Warehouse Mining Tool Stephen Turner Chris Frala
1 Dr. Scott Schaefer Least Squares Curves, Rational Representations, Splines and Continuity.
Chart Deception Main Source: How to Lie with Charts, by Gerald E. Jones Dr. Michael R. Hyman, NMSU.
1 Non Deterministic Automata. 2 Alphabet = Nondeterministic Finite Accepter (NFA)
Introduction Embedded Universal Tools and Online Features 2.
What impact does the address have on the tribe?
úkol = A 77 B 72 C 67 D = A 77 B 72 C 67 D 79.
Schutzvermerk nach DIN 34 beachten 05/04/15 Seite 1 Training EPAM and CANopen Basic Solution: Password * * Level 1 Level 2 * Level 3 Password2 IP-Adr.
Presentation transcript:

The Limits of Quantum Computers (or: What We Cant Do With Computers We Dont Have) Scott Aaronson University of Waterloo BQP NP- complete SZK

So then why cant we just ignore quantum computing, and get back to real work?

Because the universe isnt classical My picture of reality, as an eleven-year-old messing around with QBASIC: + details Fancier version: Extended Church-Turing Thesis (Also Stephen Wolframs current picture of reality)

Shors factoring algorithm presents us with a choice 1. the Extended Church-Turing Thesis is false, 2. textbook quantum mechanics is false, or 3. theres an efficient classical factoring algorithm. All three seem like crackpot speculations. At least one of them is true! Thats why YOU should care about quantum computing Either

My Spiel In One Slide 1. Ignoring quantum mechanics wont make it go away 2. Quantum computing is not a panaceaand that makes it more interesting rather than less! 3. On our current understanding, quantum computers could merely break RSA, simulate quantum physics, etc.not solve generic search problems exponentially faster 4. So then why do I worry about quantum computing? Because Im interested in fundamental limits on what can efficiently be computed in the physical world. That makes me professionally obligated to care!

Where Do I Come In? My work, over the last seven years, has deepened our understanding of the limitations of quantum computers. Solved some of the fields notorious open problems: - Lower bound for finding collisions in hash functions - Direct product theorem for quantum search Made unexpected connections: - Classical lower bounds proved by quantum arguments - Quantum-state learning algorithm from a lower bound

Plan of Talk The Gospel According to Shor Three Limitations of Quantum Computers - Finding collisions in hash functions - Solving NP-complete problems with advice - Finding local optima Turning Lemons into Lemonade - Approximately learning quantum states Summary of Contributions

What Quantum Mechanics Says If we observe, we see |0 with probability | | 2 |1 with probability | | 2 Also, the object collapses to whichever outcome we see If an object can be in two distinguishable states |0 or |1, then it can also be in a superposition |0 + |1 Here and are complex amplitudes satisfying | | 2 +| | 2 =1

To modify a state we can multiply vector of amplitudes by a unitary matrixone that preserves

Were seeing interference of amplitudesthe source of all quantum weirdness

A quantum state of n qubits takes 2 n complex numbers to describe: Quantum Computing The goal of quantum computing is to exploit this exponentiality in our description of the world Idea: Get paths leading to incorrect answers to interfere destructively and cancel each other out

Plan of Talk The Gospel According to Shor Three Limitations of Quantum Computers - Finding collisions in hash functions - Solving NP-complete problems with advice - Finding local optima Turning Lemons into Lemonade - Approximately learning quantum states Summary of Contributions

f x f(x) In this talk, Ill only care about the number of queries to a black box, not any other computational steps Example: Given a function f:{0,1} n {0,1}, suppose we want to decide if theres an x such that f(x)=1 Classically, ~2 n queries to f are needed Grover gave a quantum algorithm that uses only ~2 n/2 queries [BBBV 1997]: Grovers algorithm is optimal Yields black-box evidence that quantum computers cant solve NP-complete problems efficiently The Quantum Black-Box Model But why do black-box results tell us anything about the real world? Remember IP=PSPACE? You gotta start somewhere Almost all known quantum algorithms are black-box (no quantum IP=PSPACE yet) The proof of the pudding is in the proving

Algorithms state: x: location to query w: workspace qubits After a query transformation: Between two queries, we can apply an arbitrary unitary matrix that doesnt depend on f Complexity = minimum number of queries needed to achieve for all oracles f

Plan of Talk The Gospel According to Shor Three Limitations of Quantum Computers - Finding collisions in hash functions - Solving NP-complete problems with advice - Finding local optima Turning Lemons into Lemonade - Approximately learning quantum states Summary of Contributions

Problem: Find 2 numbers that are the same (each number appears twice) By birthday paradox, a randomized algorithm must examine N of the N numbers [Brassard-Høyer-Tapp 1997] Quantum algorithm based on Grover that uses only N 1/3 queries Is that optimal? Proving a lower bound better than constant was open for 5 years

Motivation for the Collision Problem Graph Isomorphism: find a collision in Statistical Zero Knowledge (SZK) protocols ? Cryptographic Hash Functions

What makes the problem so hard? Basically, that a quantum computer can almost find a collision after one query! Measure 2 nd register Or: if only we could see the whole trajectory of a hidden variable coursing through the quantum system! [A., Phys. Rev. A 2005] If only we could now measure twice! Previous techniques werent sensitive to the fact that quantum mechanics doesnt allow these things

[A., STOC02]N 1/5 lower bound on quantum query complexity of the collision problem [Shi, FOCS02] [A.-Shi, J. ACM 2004] Improved to N 1/3 ; also N 2/3 lower bound for element distinctness [Kutin 2003] [Ambainis 2003] [Midrijanis 2003] Simplifications and generalizations

Cartoon Version of Proof T-query quantum algorithm that finds collisions in 2-to-1 functions T-query quantum algorithm that distinguishes 1-to-1 from 2-to-1 functions Let p(f) = probability algorithm says f is 2-to-1 Let q(k) = average of p(f) over all k-to-1 functions f [Beals et al. 1998] p(f) is a multilinear polynomial, of degree at most 2T, in Boolean indicator variables (f(x),y) Suppose it exists by way of contradiction… Trivial yet crucial facts: q(k) [0,1] for all k=1,2,3,… q(1) 1/3 q(2) 2/3

Thats why The magic step: q(k) itself is a univariate polynomial in k, of degree at most 2T Why?

q(k) k N 2/5 Large derivative Bounded in [0,1] at integer points [A. A. Markov, 1889]: Hence the original quantum algorithm must have made (N 1/5 ) queries

Plan of Talk The Gospel According to Shor Three Limitations of Quantum Computers - Finding collisions in hash functions - Solving NP-complete problems with advice - Finding local optima Turning Lemons into Lemonade - Approximately learning quantum states Summary of Contributions

Could there be a quantum state | left over from the Big Bang, such that given any 3SAT instance of size 1,000,000, we could quickly solve it by just measuring | in an appropriate basis? [A., CCC 2004] In the black-box model, no: there cannot exist any golden state for solving NP-complete problems in polynomial time The Hunt for the Golden State

Efficient quantum algorithm to solve SAT using an m-qubit golden state Efficient quantum algorithm to solve (say) m 3 SAT instances, reusing the same golden state Algorithm to solve m 3 SAT instances with probability 2 -m Guess the golden state! Replace it by the maximally mixed state, i.e. a random m-bit string Suppose it exists by way of contradiction… To get a contradiction, I now need to prove a direct- product theorem for quantum search: If a quantum algorithm doesnt even have time to solve one search problem w.h.p., then the probability of its solving k search problems decreases exponentially with k

How do I prove the direct-product theorem? Again using the polynomial method But this time I need a generalization of A. A. Markovs inequality due to [V. A. Markov 1892], which takes into account not just the first derivative but all higher derivatives [Klauck-Špalek-deWolf, FOCS04] tightened my direct product theorem, and also used it to prove the first quantum time-space tradeoffs n2n m3m3

Plan of Talk The Gospel According to Shor Three Limitations of Quantum Computers - Finding collisions in hash functions - Solving NP-complete problems with advice - Finding local optima Turning Lemons into Lemonade - Approximately learning quantum states Summary of Contributions

Problem: Were given black-box access to a function f:{0,1} n Z We want to find a local minimum of f, evaluating f as few times as possible [Aldous 1983] Randomized algorithm making 2 n/2 n queries [A., STOC04] Quantum algorithm making 2 n/3 n 1/6 queries [Aldous 1983] Any randomized alg needs 2 n/2-o(n) queries [A., STOC04] Any quantum alg needs 2 n/4 /n queries My lower-bound proof uses Ambainiss quantum adversary method, which upper-bounds how much the entanglement between algorithm and oracle can increase via a single query

Quantum Generosity … Giving back because we care TM Surprising part: Quantum-inspired argument also yields a better classical lower bound: 2 n/2 /n 2 Also yields the first randomized or quantum lower bounds for local search on constant- dimensional grid graphs Subsequent improvements: [Santha-Szegedy, STOC04] [Zhang, STOC06] [Verhoeven, 2006] [Sun-Yao, FOCS06]

Plan of Talk The Gospel According to Shor Three Limitations of Quantum Computers - Finding collisions in hash functions - Solving NP-complete problems with advice - Finding local optima Turning Lemons into Lemonade - Approximately learning quantum states Summary of Contributions

[ANTV 1999]: | must have (n) qubitsno asymptotic savings over classical (Surprisingly, an n-qubit quantum state has no more independently accessible degrees of freedom than an n-bit classical string) The Lemon | n-bit string, x 1 …x n Any one bit x i of our choice, with high probability Quantum random access coding

Upper bound on the sample complexity of PAC (Probably Approximately Correctly) learning a quantum state Informally: Can predict approximate expectation values of most measurements on an n-qubit state, after a number of sample measurements that increases only linearly with n The Lemonade | Quantum Occams Razor Theorem [A. 2006] By contrast, traditional quantum state tomography requires ~4 n measurements Record so far: n=8 Prohibitive for much larger n

Plan of Talk The Gospel According to Shor Three Limitations of Quantum Computers - Finding collisions in hash functions - Solving NP-complete problems with advice - Finding local optima Turning Lemons into Lemonade - Approximately learning quantum states Summary of Contributions

Solved several notorious open problems about the limitations of quantum computers Gave evidence that collision-resistant hash functions can still exist in a quantum world Proved the first direct product theorem for quantum search Gave evidence against golden states for NP-complete problems Solved open problems about classical local optimization using quantum techniques Used a quantum coding lower bound to propose a new learning algorithm, with possible experimental implications Summary of Contributions

Ten Research Directions I Didnt Tell You About Today Addressing skepticism of quantum computing [A., STOC 2004] Grover search with finite speed of light [A.-Ambainis, FOCS 2003] Quantum versus classical proofs [A.-Kuperberg, CCC 2007] Need to uncompute garbage in quantum algorithms [A., QIC 2003] Practical simulation of stabilizer quantum circuits [A.-Gottesman, Phys Rev A 2004] Quantum software copy- protection [A., in preparation] Quantum computers with anthropic postselection [A., Proc. Roy. Soc. 2005] Quantum computers with closed timelike curves [A.-Watrous, in preparation] Provably-nonrelativizing circuit lower bounds [A., CCC 2006] Complexity of Bayesian agreement protocols [A., STOC 2005]