1 / 37

Playing (quantum) games with operator spaces

Playing (quantum) games with operator spaces. David Pérez-García Universidad Complutense de Madrid Bilbao 8-Oct-2011. Our group. 2 postdoctoral research positions opened in our group “Mathematics and Quantum Information ”. Structure of the talk. The object under study: 2P1R games

harper
Télécharger la présentation

Playing (quantum) games with operator spaces

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Playing (quantum) gameswithoperatorspaces David Pérez-García Universidad Complutense de Madrid Bilbao 8-Oct-2011

  2. Ourgroup • 2 postdoctoral research positions opened in ourgroup “Mathematics and Quantum Information”.

  3. Structure of the talk • The object under study: 2P1R games • Examples. Why are they important? • Complexity theory I. Inaproximability results. • Complexity theory II. Parallel computation. • Position based cryptography. • Certifiable random number generation. • A bit (just one bit!) of history. • Where are the maths? • Our contribution. Operator Spaces.

  4. 2P1R games

  5. 2P1R games A set of possible questions for Alice and Bob (denoted by x,yresp.). A known probability distribution for the questions. A known boolean function V(x,y,a,b) which decides, based on questions and answers a,b, whether they witn (=1) or loose (=0) the game. A limitation in the communication between Alice and Bob. y x b a

  6. 2P1R games The value of the game is the largest probability of wining the game while optimizing over the possible strategies of Alice and Bob. It is assumed that Alice and Bob have free communication BEFORE the game to coordinate an strategy . Hence strategies can involve shared randomness (classical value of the game) or quantum entanglement(quantum value of the game) depending on the resources of Alice and Bob. y x b a

  7. 2P1R games What is an strategy? A probability distribution p(ab|xy) Which are the possible strategies in the classical case? x y b a And in the quantum one?

  8. EXAMPLES. Inaproximability

  9. examples. Inaproximability results Theorem(PCP theorem (Arora-Safra, 92)+ Parallel repetition (Raz, 94)): Unless P=NP, given e>0 and a polynomial algorithm to determine the classical value of a game, there exist games for which the value is 1 and the algorithm outputs a value <e. e 0 1

  10. Examples. Inaproximability results It is the mother of most inaproximability results. For instance: Theorem (Hastad, 1999): Unless P=NP, given e>0 and a polynomial algorithm to determine the MAX-CLIQUE of a graph, there exist graphs of n vertices for which Note that MAX-CLIQUE is always less or equal than n (!!)

  11. Examples. Inaproximability results Connection with 2P1R games. Via LABEL-COVER. Given a bipartite graph And a set of colors And a set of valid configurations for each edge Find a coloring of the graph which maximizes the number of edges with a valid configuration.

  12. Examples. Inaproximability results Connection with 2P1R games. Via LABEL-COVER. Colors Number of valid edges = 4 Solution to LABEL-COVER = 5

  13. Examples. Inaproximability results Connection with 2P1R games. Via LABEL-COVER. Given and instance of LABEL-COVER, we define a 2P1R game by: Questions = vertices (from U to Alice and from W to Bob) with uniform probability between the pairs which conform an edge (and 0 in the rest). Answers = colors. They win the game if they give a valid coloring for the edge which is asked.

  14. Examples. Parallel computation

  15. Examples. Parallel computation Given a boolean function f(x,y), minimize c in: x y c bits of communication f(x,y) f(x,y)

  16. Examples. Position based cryptography.(chandran et al, 2009)

  17. Examples.Position based cryptography 1D for simplicity Position P x y b a Coordinated AIM: That only someone in position P could answer with probability 1 to the challenge. It would allow unconditional secure communication !!!

  18. Examples.Position based cryptography Relation with 2P1R games. Since the verifiers act coordinated, we can assume there is just one of them. Based on answering times, we have: y x b a Communication “independent-one-way”

  19. Examples.Position based cryptography Hence, the aim is to find a challenge which can be won always with arbitrary communication (all classical challenges are like that) but not with “independent-one-way” communication. y x The honest case is the one of arbitrary communication, since there is only a single prover. a b

  20. Examples.Position based cryptography This is impossible classically. Both models of communication are the same. To see it, just copy and send the received question. In the quantum case (with no entanglement) it is indeed possible (Buhrman et al., 2010). The key idea lies on the fact that it is NOT possible to copy quantum states by the NO-CLONING theorem. Question: Is it also possible when a polynomial amount of entanglement is allowed? Partial answers (Beigi et al., Burhman et al, 2011): LINEAR = YES, EXPONENTIAL = NO.

  21. Examples. Randomnumbergeneration(pironio et al., 2010)

  22. Example.Random number generation PROBLEM: How to construct an apparatus which generates perfect random numbers (and hence secret) in a certifiable way? 001110101001010101….. could have a copy of 001110101001010101….. But in quantum mechanics copying is not allowed !!!

  23. Example.Random number generation Theorem (Pironio et al., Colbeck et al., 2010): If (after many rounds in the game) one gets a value strictly larger than the classical one, there is a classical “deterministic” post-processing of the outputs a, b which produces numbers which are perfectly random and secret. x y b a DONE EXPERIMENTALLY ALREADY !!!

  24. Example.Random number generation The key is, hence, the existence of quantum strategies which are NOT classical. This guarantees an intrinsic randomness. Classical Quantum Non-signaling

  25. HISTORICAL NOTE The existence of this intrinsic randomness is precisely what Einstein did not believe in his criticism of quantum mechanics in the 30’s. The first experiment showing that, indeed, this randomness does ocurr was done by A. Aspect in the 80’s. The experiment was based precisely on the analysis of the value of a particular game, known as CHSH (Clauser, Horne, Shimony, Holt).

  26. Our contribution

  27. The problem we want to attack How large can D be? Classicalstrategies D Quantum strategies Estimate D. Parameters: Number of questions = N Number of answers = M Size (dimension) of the quantum system = d

  28. Violation of a bell inequality. Formal definition of D. Bell inqualityT BELL INEQUALITY= 2P1R GAME (generalized)

  29. Operational interpretation of D Where p is the maximum (classical) noise which a quantum strategy can withstand before getting classical. Bell InequalityT It is hence desirable to have a large D. How does D scale with the parameters N,M, d?

  30. MAIN THEOREM Theorem (Junge, Palazuelos, Pérez-García, Villanueva, Wolf, CMP + PRL, 2010). D can be arbitrarily large, This requires: N= D^2 M= EXP(D) d= D^2 Recentimprovements Theorem(Junge, Palazuelos, CMP, 2011). D can be arbitrarily large, This requires: N= D^2, M= D^2, d= D^2 Theorem (Buhrman et al, 2011). D can be arbitrarily large, This requires: N= D, M= EXP(D), d= D.

  31. An interesting application Theorem (Junge, Palazuelos, Pérez-García, Villanueva, Wolf, CMP + PRL, 2010). There exist quantum estrategies with EXP(N) questions, N answers and dimension of the quantum system N which need the communication of log(N) bits to be simulated classically. Quantum entanglement can save communication!!!

  32. The tools: Operator spaces

  33. Operator Spaces An operator space is a complex vector space E with a sequence of norms defined on such that: Given a C*-algebra, there exists a unique norm which makes a C*-algebra. With these norms, A is an operator space.

  34. Operator spaces In particular: Given

  35. Operator spaces The morphisms in this category are the completely bounded maps: CB(E,F) is an operator space via In particular E* is an operator space

  36. Connection with the 2P1R games Theorem (Junge, Palazuelos, Pérez-García, Villanueva, Wolf, CMP + PRL, 2010). Given a 2P1R game (or more generally a Bell inequality) The classical value is given (with the order a,x,b,y) by the norm: The quantum value, by the norm:

  37. What we learnt • Operator Spaces are the natural mathematical framework to analyze 2P1R games. • Some references in this direction: • D. Pérez-García, M.M. Wolf, C. Palazuelos, I. Villanueva, M. Junge, Unbounded violations of Bell inequalities, Comm. Math. Phys. 279, 455 (2008) • M. Junge, C. Palazuelos, D. Pérez-García, I. Villanueva, M.M. Wolf, Operator Space theory: a natural framework for Bell inequalities, Phys. Rev. Lett. 104, 170405 (2010). • M. Junge, C. Palazuelos, D. Pérez-García, I. Villanueva, M.M. Wolf, Unbounded violations of bipartite Bell Inequalities via Operator Space theory, Comm. Math. Phys. 300, 715–739 (2010). • M. Junge, M. Navascués, C. Palazuelos, D. Pérez-García, V.B. Scholtz, R.F. Werner, Connes' embedding problem and Tsirelson's problem, J. Math. Phys. 52, 012102 (2011) • A.Salles, D. Cavalcanti, A. Acín, D. Pérez-García., M.M. Wolf, Bell inequalities from multilinear contractions, Quant. Inf. Comp. 10, 0703-0719 (2010) . • M. Junge, C. Palazuelos, Large violation of Bell inequalities with low entanglement, Comm. Math. Phys. 306 (3), 695-746 (2011) .

More Related