Atoms, quanta, and qubits: Atomism in quantum mechanics and information
Quantum Supremacy and its Applications€¦ · #1 Application of quantum computing: ... et al. from...
Transcript of Quantum Supremacy and its Applications€¦ · #1 Application of quantum computing: ... et al. from...
![Page 1: Quantum Supremacy and its Applications€¦ · #1 Application of quantum computing: ... et al. from IBM and Chen et al. from Alibaba have now shown how to handle up to ~70 qubits](https://reader034.fdocuments.in/reader034/viewer/2022050302/5f6aef3e6766ef7c50049f1d/html5/thumbnails/1.jpg)
ScottAaronson(UniversityofTexas,Austin)SimonsInstitute,Berkeley,June12,2018
BasedonjointworkwithLijieChen(CCC’2017,arXiv:1612.05903)andonforthcomingwork
Papersandslidesatwww.scottaaronson.com
QuantumSupremacyanditsApplications
HELLO HILBERT SPACE
![Page 2: Quantum Supremacy and its Applications€¦ · #1 Application of quantum computing: ... et al. from IBM and Chen et al. from Alibaba have now shown how to handle up to ~70 qubits](https://reader034.fdocuments.in/reader034/viewer/2022050302/5f6aef3e6766ef7c50049f1d/html5/thumbnails/2.jpg)
#1Applicationofquantumcomputing:DisproveGilKalai!(AndtheExtendedChurch-TuringThesis)
|〉Mightactuallybeabletoachieveinthenextcoupleyears,e.g.withGoogle’s72-qubitBristleconechip.
“Obviouslyuselessforanythingelse,”butwhocares?
QUANTUMSUPREMACY
![Page 3: Quantum Supremacy and its Applications€¦ · #1 Application of quantum computing: ... et al. from IBM and Chen et al. from Alibaba have now shown how to handle up to ~70 qubits](https://reader034.fdocuments.in/reader034/viewer/2022050302/5f6aef3e6766ef7c50049f1d/html5/thumbnails/3.jpg)
TheSamplingApproachPutforwardbyA.-Arkhipov2011(BosonSampling),
Bremner-Jozsa-Shepherd2011(IQPModel),andothers
PostBQP
PostBPP
PostBQP:whereweallowpostselectiononexponentially-unlikelymeasurementoutcomes
PostBPP:Classicalrandomizedsubclass
Theorem(A.2004):PostBQP=PP
PostBPPisinthepolynomialhierarchy
Considerproblemswherethegoalistosamplefromadesireddistributionovern-bitstrings
Comparedtoproblemswithasinglevalidoutput(likeFACTORING),samplingproblemscanbe
(1) Easiertosolvewithnear-futurequantumdevices,and
(2) Easiertoarguearehardforclassicalcomputers!
(We“merely”giveupon:practicalapplications,fastclassicalwaytoverifytheresult…?)
![Page 4: Quantum Supremacy and its Applications€¦ · #1 Application of quantum computing: ... et al. from IBM and Chen et al. from Alibaba have now shown how to handle up to ~70 qubits](https://reader034.fdocuments.in/reader034/viewer/2022050302/5f6aef3e6766ef7c50049f1d/html5/thumbnails/4.jpg)
TheRandomQuantumCircuitProposal
GenerateaquantumcircuitConnqubitsina√n×√nlattice,withdlayersofrandomnearest-neighborgates
ApplyCto|0〉⊗nandmeasure.RepeatTtimes,toobtainsamplesx1,…,xTfrom{0,1}n
Checkwhetherx1,…,xTsolvethe“HeavyOutputGeneration”(HOG)problem—e.g.,doatleast2/3ofthexi’shavemorethanthemedianprobability?
(takesclassicalexponentialtime,whichisOKforn≈70)
PublishC.Challengeskepticstogeneratesamplespassingthetestinareasonableamountoftime
![Page 5: Quantum Supremacy and its Applications€¦ · #1 Application of quantum computing: ... et al. from IBM and Chen et al. from Alibaba have now shown how to handle up to ~70 qubits](https://reader034.fdocuments.in/reader034/viewer/2022050302/5f6aef3e6766ef7c50049f1d/html5/thumbnails/5.jpg)
xxe−
xe−
![Page 6: Quantum Supremacy and its Applications€¦ · #1 Application of quantum computing: ... et al. from IBM and Chen et al. from Alibaba have now shown how to handle up to ~70 qubits](https://reader034.fdocuments.in/reader034/viewer/2022050302/5f6aef3e6766ef7c50049f1d/html5/thumbnails/6.jpg)
OurStrongHardnessAssumptionThere’snopolynomial-timeclassicalalgorithmAsuchthat,givenauniformly-randomquantumcircuitCwithnqubitsandm>>ngates,
( ) ( )nnn
CCCA −⊗⊗
Ω+≥⎥⎦⎤
⎢⎣⎡ > 2
21median00 whether guesses Pr
2
Note:Thereisapolynomial-timeclassicalalgorithmthatguesseswithprobability
m41
21+≈
(justexpand〈0|⊗nC|0〉⊗noutasasumof4mterms,thensampleafewrandomones)
![Page 7: Quantum Supremacy and its Applications€¦ · #1 Application of quantum computing: ... et al. from IBM and Chen et al. from Alibaba have now shown how to handle up to ~70 qubits](https://reader034.fdocuments.in/reader034/viewer/2022050302/5f6aef3e6766ef7c50049f1d/html5/thumbnails/7.jpg)
Theorem:AssumeSHA.ThengivenasinputarandomquantumcircuitC,withnqubitsandm>>ngates,there’snopolynomial-timeclassicalalgorithmthatevenpassesourstatisticaltestforC-samplingw.h.p.
ProofSketch:GivenacircuitC,first“hide”whichamplitudewecareaboutbyapplyingarandomXOR-masktotheoutputs,producingaC’suchthat nnn CzC ⊗⊗⊗
= 00'0
NowletAbeapoly-timeclassicalalgorithmthatpassesthetestforC’withprobability≥0.99.SupposeAoutputssamplesx1,…,xT.Thenifxi=zforsomei∈[T],guessthat
median002≥
⊗⊗ nnC
Otherwise,guessthatwithprobability122
1+
− nT
ViolatesSHA!
Ofcoursewe’dlikehardnessofrandomcircuitsamplingbasedonaweakercomplexity
assumption.RecentpartialprogressinthatdirectionbyBouland,Fefferman,Nirkhe,
VaziraniarXiv:1803.04402
![Page 8: Quantum Supremacy and its Applications€¦ · #1 Application of quantum computing: ... et al. from IBM and Chen et al. from Alibaba have now shown how to handle up to ~70 qubits](https://reader034.fdocuments.in/reader034/viewer/2022050302/5f6aef3e6766ef7c50049f1d/html5/thumbnails/8.jpg)
Time-SpaceTradeoffsforSimulatingQuantumCircuits
Givenageneralquantumcircuitwithnqubitsandm>>ntwo-qubitgates,howshouldwesimulateitclassically?
“Schrödingerway”:
Storewholewavefunction
O(2n)memory,O(m2n)time
n=40,m=1000:FeasiblebutrequiresTBofRAM
“Feynmanway”:
Sumoverpaths
O(m+n)memory,O(4m)time
n=40,m=1000:InfeasiblebutrequireslittleRAM
Bestofbothworlds?
![Page 9: Quantum Supremacy and its Applications€¦ · #1 Application of quantum computing: ... et al. from IBM and Chen et al. from Alibaba have now shown how to handle up to ~70 qubits](https://reader034.fdocuments.in/reader034/viewer/2022050302/5f6aef3e6766ef7c50049f1d/html5/thumbnails/9.jpg)
Theorem:LetCbeaquantumcircuitwithnqubitsanddlayersofgates.Thenwecancomputeeachtransitionamplitude,〈x|C|y〉,indO(n)timeandpoly(n,d)memory
Proof:Savitch’sTheorem!RecursivelydivideCintotwochunks,C1andC2,withd/2layerseach.Then
{ }∑∈
=nz
yCzzCxyCx1,0
21 ||||||
C1C2
Candobetterfornearest-neighborcircuits,orwhenmorememoryisavailable
Thisalgorithmstilldoesn’tfalsifytheSHA!Whynot?
![Page 10: Quantum Supremacy and its Applications€¦ · #1 Application of quantum computing: ... et al. from IBM and Chen et al. from Alibaba have now shown how to handle up to ~70 qubits](https://reader034.fdocuments.in/reader034/viewer/2022050302/5f6aef3e6766ef7c50049f1d/html5/thumbnails/10.jpg)
WhatAboutErrors?
kbit-fliperrors⇒deviationfromtheuniformdistributionissuppressedbya1/exp(k)factor.Withouterror-correction,canonlytolerateafewerrors.Willcomedowntonumbers.
Verification
Needstobedifficultbutnotimpossible(likeBitcoinmining).Partlyusingourrecursiveapproach,Pednaultetal.fromIBMandChenetal.fromAlibabahavenowshownhowtohandleupto~70qubitsclassically.Perfectlyconsistentwithwhatwe’retryingtodo!
![Page 11: Quantum Supremacy and its Applications€¦ · #1 Application of quantum computing: ... et al. from IBM and Chen et al. from Alibaba have now shown how to handle up to ~70 qubits](https://reader034.fdocuments.in/reader034/viewer/2022050302/5f6aef3e6766ef7c50049f1d/html5/thumbnails/11.jpg)
RandomBitsareObviouslyUseless…
1101000011010011110110110011001100010100100110100011111011110100
![Page 12: Quantum Supremacy and its Applications€¦ · #1 Application of quantum computing: ... et al. from IBM and Chen et al. from Alibaba have now shown how to handle up to ~70 qubits](https://reader034.fdocuments.in/reader034/viewer/2022050302/5f6aef3e6766ef7c50049f1d/html5/thumbnails/12.jpg)
CertifiedRandomBits:WhoNeeds‘Em?
PostBQP
PostBPP
PostBQP:whereweallowpostselectiononexponentially-unlikelymeasurementoutcomes
PostBPP:Classicalrandomizedsubclass
Theorem(A.2004):PostBQP=PP
PostBPPisinthepolynomialhierarchy
Forprivateuse:Cryptographickeys(abigone!)
Forpublicuse:Electionauditing,lotteries,parametersforcryptosystems,zero-knowledgeprotocols,proof-of-stakecryptocurrencies…
TrivialQuantumRandomnessSolution!
H|0〉
Problem:WhatifyourquantumhardwarewasbackdooredbytheNSA?(LiketheDUAL_EC_DRBGpseudorandomgeneratorwas?)Wanttotrustadeterministicclassicalcomputeronly
![Page 13: Quantum Supremacy and its Applications€¦ · #1 Application of quantum computing: ... et al. from IBM and Chen et al. from Alibaba have now shown how to handle up to ~70 qubits](https://reader034.fdocuments.in/reader034/viewer/2022050302/5f6aef3e6766ef7c50049f1d/html5/thumbnails/13.jpg)
EarlierApproach:Bell-CertifiedRandomnessGeneration
ColbeckandRenner,Pironioetal.,VaziraniandVidick,CoudronandYuen,MillerandShi…
Upside:Doesn’tneedaQC;usesonly“currenttechnology”(thoughloophole-freeBellviolationsareonly~2yearsold)
Downside:Ifyou’regettingtherandombitsovertheInternet,howdoyouknowAliceandBobwereseparated?
![Page 14: Quantum Supremacy and its Applications€¦ · #1 Application of quantum computing: ... et al. from IBM and Chen et al. from Alibaba have now shown how to handle up to ~70 qubits](https://reader034.fdocuments.in/reader034/viewer/2022050302/5f6aef3e6766ef7c50049f1d/html5/thumbnails/14.jpg)
RandomnessfromQuantumSupremacyExperiments
Upsides:Requiresjustasingledevice—goodforcertifiedrandomnessovertheInternet.IdeallysuitedtoNISQdevices
Caveats:Requireshardnessassumptionsandinitialseedrandomness.Verification(withmyscheme)takesexp(n)time
KeyInsight:AQCcansolvecertainsamplingproblemsquickly—butunderplausiblehardnessassumptions,itcanonlydosobysampling(andhence,generatingrealentropy)
SEED
CH
ALLE
NG
ES
![Page 15: Quantum Supremacy and its Applications€¦ · #1 Application of quantum computing: ... et al. from IBM and Chen et al. from Alibaba have now shown how to handle up to ~70 qubits](https://reader034.fdocuments.in/reader034/viewer/2022050302/5f6aef3e6766ef7c50049f1d/html5/thumbnails/15.jpg)
Applications
FortheQCowner:Privaterandomness
Theprotocoldoesrequirepseudorandomchallenges,but:
Evenifthepseudorandomgeneratorisbrokenlater,thetrulyrandombitswillremainsafe(“forwardsecrecy”)
Eveniftheseedwaspublic,therandombitscanbeprivate
Therandombitsdemonstrablyweren’tknowntoanyone,eventheQC,beforeitreceivedachallenge(freshness)
Forthoseconnectingoverthecloud:Publicrandomness
![Page 16: Quantum Supremacy and its Applications€¦ · #1 Application of quantum computing: ... et al. from IBM and Chen et al. from Alibaba have now shown how to handle up to ~70 qubits](https://reader034.fdocuments.in/reader034/viewer/2022050302/5f6aef3e6766ef7c50049f1d/html5/thumbnails/16.jpg)
TheProtocol1.Theclassicalclientgeneratesn-qubitquantumcircuitsC1,…,CTpseudorandomly(mimickingarandomensemble)
2.Foreacht,theclientsendsCttotheserver,thendemandsaresponseStwithinaveryshorttime
Inthe“honest”case,theresponseisalistofksamplesfromtheoutputdistributionofCt|0〉⊗n
3.TheclientpicksO(1)randomiterationst,andforeachone,checkswhetherStsolves“HOG”(HeavyOutputGeneration)
4.Ifthesecheckspass,thentheclientfeedsS=〈S1,…,ST〉intoaclassicalrandomnessextractor,suchasGUV(Guruswami-Umans-Vadhan),togetnearlypurerandombits
![Page 17: Quantum Supremacy and its Applications€¦ · #1 Application of quantum computing: ... et al. from IBM and Chen et al. from Alibaba have now shown how to handle up to ~70 qubits](https://reader034.fdocuments.in/reader034/viewer/2022050302/5f6aef3e6766ef7c50049f1d/html5/thumbnails/17.jpg)
MainResultSupposethatsuitablehardnessassumptionshold,andthattheserverdoesatmostnO(1)quantumcomputationperiteration.Supposealsothatweruntheprotocol,forT≤2nsteps,andtheclientacceptswithprobability>½.Thenconditionedontheclientaccepting,theoutputbitsSare1/exp(nΩ(1))-closeinvariationdistancetoadistributionwithmin-entropyΩ(Tn).
( )[ ]min 21: min log
PrxD
H Dx
=
Whichmeans:theextractorwilloutputΩ(Tn)bitsthatareexponentiallyclosetouniform
Hardestpart:showaccumulationofmin-entropyacrosstheTiterations.E.g.,ruleoutthatthesamplesarecorrelated
![Page 18: Quantum Supremacy and its Applications€¦ · #1 Application of quantum computing: ... et al. from IBM and Chen et al. from Alibaba have now shown how to handle up to ~70 qubits](https://reader034.fdocuments.in/reader034/viewer/2022050302/5f6aef3e6766ef7c50049f1d/html5/thumbnails/18.jpg)
DifferentApproachBrakerski,Christiano,Mahadev,Vazirani,VidickarXiv:1804.00640
MethodforaQCtogeneraterandombits,assumingthequantumhardnessofbreakinglattice-basedcryptosystems
HugeadvantageoftheBCMVVschemeovermine:Polynomial-timeclassicalverification!
Advantageofmine:CanberunonNISQdevices!
2-to-1functionf,plustrapdoor
( )2x
x yx f x
+→∑
ff(x)
measurementbasismeasurementresult
![Page 19: Quantum Supremacy and its Applications€¦ · #1 Application of quantum computing: ... et al. from IBM and Chen et al. from Alibaba have now shown how to handle up to ~70 qubits](https://reader034.fdocuments.in/reader034/viewer/2022050302/5f6aef3e6766ef7c50049f1d/html5/thumbnails/19.jpg)
FutureDirectionsCanwegetquantumsupremacy,aswellascertifiedrandomness,undermore“standard”andless“boutique”complexityassumptions?
Canwegetpolynomial-timeclassicalverificationandNISQimplementabilityatthesametime?
CanwegetmoreandmorecertifiedrandomnessbysamplingwiththesamecircuitCoverandover?Wouldgreatlyimprovethebitrate,removetheneedforaPRF
CanweproveourrandomnessschemesoundevenagainstadversariesthatareentangledwiththeQC?
![Page 20: Quantum Supremacy and its Applications€¦ · #1 Application of quantum computing: ... et al. from IBM and Chen et al. from Alibaba have now shown how to handle up to ~70 qubits](https://reader034.fdocuments.in/reader034/viewer/2022050302/5f6aef3e6766ef7c50049f1d/html5/thumbnails/20.jpg)
ConclusionsWemightbecloseto~70-qubitquantumsupremacyexperiments.Wecansaynontrivialthingsaboutthehardnessofsimulatingtheseexperiments,butwe’dliketosaymore
Certifiedrandomnessgeneration:themostplausibleapplicationofvery-near-termQCs?
Thisapplicationrequiressamplingproblems:problemswithdefiniteanswers(likefactoring)areuseless!
Notonlycanwedoitwith~70qubits,wedon’twantmore.Noexpensiveencodingneeded;canfullyexploithardware
Withthisapplication,alltheweaknessesofsampling-basedquantumsupremacyexperimentsbecomestrengths!