Quantum Supremacy and its Applications€¦ · #1 Application of quantum computing: ... et al. from...

20
Scott Aaronson (University of Texas, Austin) Simons Institute, Berkeley, June 12, 2018 Based on joint work with Lijie Chen (CCC’2017, arXiv: 1612.05903) and on forthcoming work Papers and slides at www.scottaaronson.com Quantum Supremacy and its Applications HELLO HILBERT SPACE

Transcript of Quantum Supremacy and its Applications€¦ · #1 Application of quantum computing: ... et al. from...

Page 1: Quantum Supremacy and its Applications€¦ · #1 Application of quantum computing: ... et al. from IBM and Chen et al. from Alibaba have now shown how to handle up to ~70 qubits

ScottAaronson(UniversityofTexas,Austin)SimonsInstitute,Berkeley,June12,2018

BasedonjointworkwithLijieChen(CCC’2017,arXiv:1612.05903)andonforthcomingwork

Papersandslidesatwww.scottaaronson.com

QuantumSupremacyanditsApplications

HELLO HILBERT SPACE

Page 2: Quantum Supremacy and its Applications€¦ · #1 Application of quantum computing: ... et al. from IBM and Chen et al. from Alibaba have now shown how to handle up to ~70 qubits

#1Applicationofquantumcomputing:DisproveGilKalai!(AndtheExtendedChurch-TuringThesis)

|〉Mightactuallybeabletoachieveinthenextcoupleyears,e.g.withGoogle’s72-qubitBristleconechip.

“Obviouslyuselessforanythingelse,”butwhocares?

QUANTUMSUPREMACY

Page 3: Quantum Supremacy and its Applications€¦ · #1 Application of quantum computing: ... et al. from IBM and Chen et al. from Alibaba have now shown how to handle up to ~70 qubits

TheSamplingApproachPutforwardbyA.-Arkhipov2011(BosonSampling),

Bremner-Jozsa-Shepherd2011(IQPModel),andothers

PostBQP

PostBPP

PostBQP:whereweallowpostselectiononexponentially-unlikelymeasurementoutcomes

PostBPP:Classicalrandomizedsubclass

Theorem(A.2004):PostBQP=PP

PostBPPisinthepolynomialhierarchy

Considerproblemswherethegoalistosamplefromadesireddistributionovern-bitstrings

Comparedtoproblemswithasinglevalidoutput(likeFACTORING),samplingproblemscanbe

(1)  Easiertosolvewithnear-futurequantumdevices,and

(2)  Easiertoarguearehardforclassicalcomputers!

(We“merely”giveupon:practicalapplications,fastclassicalwaytoverifytheresult…?)

Page 4: Quantum Supremacy and its Applications€¦ · #1 Application of quantum computing: ... et al. from IBM and Chen et al. from Alibaba have now shown how to handle up to ~70 qubits

TheRandomQuantumCircuitProposal

GenerateaquantumcircuitConnqubitsina√n×√nlattice,withdlayersofrandomnearest-neighborgates

ApplyCto|0〉⊗nandmeasure.RepeatTtimes,toobtainsamplesx1,…,xTfrom{0,1}n

Checkwhetherx1,…,xTsolvethe“HeavyOutputGeneration”(HOG)problem—e.g.,doatleast2/3ofthexi’shavemorethanthemedianprobability?

(takesclassicalexponentialtime,whichisOKforn≈70)

PublishC.Challengeskepticstogeneratesamplespassingthetestinareasonableamountoftime

Page 5: Quantum Supremacy and its Applications€¦ · #1 Application of quantum computing: ... et al. from IBM and Chen et al. from Alibaba have now shown how to handle up to ~70 qubits

xxe−

xe−

Page 6: Quantum Supremacy and its Applications€¦ · #1 Application of quantum computing: ... et al. from IBM and Chen et al. from Alibaba have now shown how to handle up to ~70 qubits

OurStrongHardnessAssumptionThere’snopolynomial-timeclassicalalgorithmAsuchthat,givenauniformly-randomquantumcircuitCwithnqubitsandm>>ngates,

( ) ( )nnn

CCCA −⊗⊗

Ω+≥⎥⎦⎤

⎢⎣⎡ > 2

21median00 whether guesses Pr

2

Note:Thereisapolynomial-timeclassicalalgorithmthatguesseswithprobability

m41

21+≈

(justexpand〈0|⊗nC|0〉⊗noutasasumof4mterms,thensampleafewrandomones)

Page 7: Quantum Supremacy and its Applications€¦ · #1 Application of quantum computing: ... et al. from IBM and Chen et al. from Alibaba have now shown how to handle up to ~70 qubits

Theorem:AssumeSHA.ThengivenasinputarandomquantumcircuitC,withnqubitsandm>>ngates,there’snopolynomial-timeclassicalalgorithmthatevenpassesourstatisticaltestforC-samplingw.h.p.

ProofSketch:GivenacircuitC,first“hide”whichamplitudewecareaboutbyapplyingarandomXOR-masktotheoutputs,producingaC’suchthat nnn CzC ⊗⊗⊗

= 00'0

NowletAbeapoly-timeclassicalalgorithmthatpassesthetestforC’withprobability≥0.99.SupposeAoutputssamplesx1,…,xT.Thenifxi=zforsomei∈[T],guessthat

median002≥

⊗⊗ nnC

Otherwise,guessthatwithprobability122

1+

− nT

ViolatesSHA!

Ofcoursewe’dlikehardnessofrandomcircuitsamplingbasedonaweakercomplexity

assumption.RecentpartialprogressinthatdirectionbyBouland,Fefferman,Nirkhe,

VaziraniarXiv:1803.04402

Page 8: Quantum Supremacy and its Applications€¦ · #1 Application of quantum computing: ... et al. from IBM and Chen et al. from Alibaba have now shown how to handle up to ~70 qubits

Time-SpaceTradeoffsforSimulatingQuantumCircuits

Givenageneralquantumcircuitwithnqubitsandm>>ntwo-qubitgates,howshouldwesimulateitclassically?

“Schrödingerway”:

Storewholewavefunction

O(2n)memory,O(m2n)time

n=40,m=1000:FeasiblebutrequiresTBofRAM

“Feynmanway”:

Sumoverpaths

O(m+n)memory,O(4m)time

n=40,m=1000:InfeasiblebutrequireslittleRAM

Bestofbothworlds?

Page 9: Quantum Supremacy and its Applications€¦ · #1 Application of quantum computing: ... et al. from IBM and Chen et al. from Alibaba have now shown how to handle up to ~70 qubits

Theorem:LetCbeaquantumcircuitwithnqubitsanddlayersofgates.Thenwecancomputeeachtransitionamplitude,〈x|C|y〉,indO(n)timeandpoly(n,d)memory

Proof:Savitch’sTheorem!RecursivelydivideCintotwochunks,C1andC2,withd/2layerseach.Then

{ }∑∈

=nz

yCzzCxyCx1,0

21 ||||||

C1C2

Candobetterfornearest-neighborcircuits,orwhenmorememoryisavailable

Thisalgorithmstilldoesn’tfalsifytheSHA!Whynot?

Page 10: Quantum Supremacy and its Applications€¦ · #1 Application of quantum computing: ... et al. from IBM and Chen et al. from Alibaba have now shown how to handle up to ~70 qubits

WhatAboutErrors?

kbit-fliperrors⇒deviationfromtheuniformdistributionissuppressedbya1/exp(k)factor.Withouterror-correction,canonlytolerateafewerrors.Willcomedowntonumbers.

Verification

Needstobedifficultbutnotimpossible(likeBitcoinmining).Partlyusingourrecursiveapproach,Pednaultetal.fromIBMandChenetal.fromAlibabahavenowshownhowtohandleupto~70qubitsclassically.Perfectlyconsistentwithwhatwe’retryingtodo!

Page 11: Quantum Supremacy and its Applications€¦ · #1 Application of quantum computing: ... et al. from IBM and Chen et al. from Alibaba have now shown how to handle up to ~70 qubits

RandomBitsareObviouslyUseless…

1101000011010011110110110011001100010100100110100011111011110100

Page 12: Quantum Supremacy and its Applications€¦ · #1 Application of quantum computing: ... et al. from IBM and Chen et al. from Alibaba have now shown how to handle up to ~70 qubits

CertifiedRandomBits:WhoNeeds‘Em?

PostBQP

PostBPP

PostBQP:whereweallowpostselectiononexponentially-unlikelymeasurementoutcomes

PostBPP:Classicalrandomizedsubclass

Theorem(A.2004):PostBQP=PP

PostBPPisinthepolynomialhierarchy

Forprivateuse:Cryptographickeys(abigone!)

Forpublicuse:Electionauditing,lotteries,parametersforcryptosystems,zero-knowledgeprotocols,proof-of-stakecryptocurrencies…

TrivialQuantumRandomnessSolution!

H|0〉

Problem:WhatifyourquantumhardwarewasbackdooredbytheNSA?(LiketheDUAL_EC_DRBGpseudorandomgeneratorwas?)Wanttotrustadeterministicclassicalcomputeronly

Page 13: Quantum Supremacy and its Applications€¦ · #1 Application of quantum computing: ... et al. from IBM and Chen et al. from Alibaba have now shown how to handle up to ~70 qubits

EarlierApproach:Bell-CertifiedRandomnessGeneration

ColbeckandRenner,Pironioetal.,VaziraniandVidick,CoudronandYuen,MillerandShi…

Upside:Doesn’tneedaQC;usesonly“currenttechnology”(thoughloophole-freeBellviolationsareonly~2yearsold)

Downside:Ifyou’regettingtherandombitsovertheInternet,howdoyouknowAliceandBobwereseparated?

Page 14: Quantum Supremacy and its Applications€¦ · #1 Application of quantum computing: ... et al. from IBM and Chen et al. from Alibaba have now shown how to handle up to ~70 qubits

RandomnessfromQuantumSupremacyExperiments

Upsides:Requiresjustasingledevice—goodforcertifiedrandomnessovertheInternet.IdeallysuitedtoNISQdevices

Caveats:Requireshardnessassumptionsandinitialseedrandomness.Verification(withmyscheme)takesexp(n)time

KeyInsight:AQCcansolvecertainsamplingproblemsquickly—butunderplausiblehardnessassumptions,itcanonlydosobysampling(andhence,generatingrealentropy)

SEED

CH

ALLE

NG

ES

Page 15: Quantum Supremacy and its Applications€¦ · #1 Application of quantum computing: ... et al. from IBM and Chen et al. from Alibaba have now shown how to handle up to ~70 qubits

Applications

FortheQCowner:Privaterandomness

Theprotocoldoesrequirepseudorandomchallenges,but:

Evenifthepseudorandomgeneratorisbrokenlater,thetrulyrandombitswillremainsafe(“forwardsecrecy”)

Eveniftheseedwaspublic,therandombitscanbeprivate

Therandombitsdemonstrablyweren’tknowntoanyone,eventheQC,beforeitreceivedachallenge(freshness)

Forthoseconnectingoverthecloud:Publicrandomness

Page 16: Quantum Supremacy and its Applications€¦ · #1 Application of quantum computing: ... et al. from IBM and Chen et al. from Alibaba have now shown how to handle up to ~70 qubits

TheProtocol1.Theclassicalclientgeneratesn-qubitquantumcircuitsC1,…,CTpseudorandomly(mimickingarandomensemble)

2.Foreacht,theclientsendsCttotheserver,thendemandsaresponseStwithinaveryshorttime

Inthe“honest”case,theresponseisalistofksamplesfromtheoutputdistributionofCt|0〉⊗n

3.TheclientpicksO(1)randomiterationst,andforeachone,checkswhetherStsolves“HOG”(HeavyOutputGeneration)

4.Ifthesecheckspass,thentheclientfeedsS=〈S1,…,ST〉intoaclassicalrandomnessextractor,suchasGUV(Guruswami-Umans-Vadhan),togetnearlypurerandombits

Page 17: Quantum Supremacy and its Applications€¦ · #1 Application of quantum computing: ... et al. from IBM and Chen et al. from Alibaba have now shown how to handle up to ~70 qubits

MainResultSupposethatsuitablehardnessassumptionshold,andthattheserverdoesatmostnO(1)quantumcomputationperiteration.Supposealsothatweruntheprotocol,forT≤2nsteps,andtheclientacceptswithprobability>½.Thenconditionedontheclientaccepting,theoutputbitsSare1/exp(nΩ(1))-closeinvariationdistancetoadistributionwithmin-entropyΩ(Tn).

( )[ ]min 21: min log

PrxD

H Dx

=

Whichmeans:theextractorwilloutputΩ(Tn)bitsthatareexponentiallyclosetouniform

Hardestpart:showaccumulationofmin-entropyacrosstheTiterations.E.g.,ruleoutthatthesamplesarecorrelated

Page 18: Quantum Supremacy and its Applications€¦ · #1 Application of quantum computing: ... et al. from IBM and Chen et al. from Alibaba have now shown how to handle up to ~70 qubits

DifferentApproachBrakerski,Christiano,Mahadev,Vazirani,VidickarXiv:1804.00640

MethodforaQCtogeneraterandombits,assumingthequantumhardnessofbreakinglattice-basedcryptosystems

HugeadvantageoftheBCMVVschemeovermine:Polynomial-timeclassicalverification!

Advantageofmine:CanberunonNISQdevices!

2-to-1functionf,plustrapdoor

( )2x

x yx f x

+→∑

ff(x)

measurementbasismeasurementresult

Page 19: Quantum Supremacy and its Applications€¦ · #1 Application of quantum computing: ... et al. from IBM and Chen et al. from Alibaba have now shown how to handle up to ~70 qubits

FutureDirectionsCanwegetquantumsupremacy,aswellascertifiedrandomness,undermore“standard”andless“boutique”complexityassumptions?

Canwegetpolynomial-timeclassicalverificationandNISQimplementabilityatthesametime?

CanwegetmoreandmorecertifiedrandomnessbysamplingwiththesamecircuitCoverandover?Wouldgreatlyimprovethebitrate,removetheneedforaPRF

CanweproveourrandomnessschemesoundevenagainstadversariesthatareentangledwiththeQC?

Page 20: Quantum Supremacy and its Applications€¦ · #1 Application of quantum computing: ... et al. from IBM and Chen et al. from Alibaba have now shown how to handle up to ~70 qubits

ConclusionsWemightbecloseto~70-qubitquantumsupremacyexperiments.Wecansaynontrivialthingsaboutthehardnessofsimulatingtheseexperiments,butwe’dliketosaymore

Certifiedrandomnessgeneration:themostplausibleapplicationofvery-near-termQCs?

Thisapplicationrequiressamplingproblems:problemswithdefiniteanswers(likefactoring)areuseless!

Notonlycanwedoitwith~70qubits,wedon’twantmore.Noexpensiveencodingneeded;canfullyexploithardware

Withthisapplication,alltheweaknessesofsampling-basedquantumsupremacyexperimentsbecomestrengths!