Interactive Proofs For Quantum Computations

The widely held belief that BQP strictly contains BPP raises fundamental questions: Upcoming generations of quantum computers might already be too large to be simulated classically. Is it possible to experimentally test that the se systems perform as they should, if we cannot efficiently comp ute predictions for their behavior? Vazirani has asked [Vaz07]: If computing predictions for Quantum Mechanics requires exponential resources, is Quantum Mechanics a falsifiable theory? In cryptographic settings, an untruste d future company wants to sell a quantum computer or perform a delegated quantum computation. Can the customer be convinced of correctness without the ability to compare results to predictions? To provide answers to these questions, we define Quantum Prov er Interactive Proofs (QPIP). Whereas in standard Interactive Proofs [GMR85] the prover is computationally unbounded, here our prover is in BQP, representing a quantum computer. The verifier models our current computati onal capabilities: it is a BPP machine, with access to few qubits. Our main theorem can be roughly stated as: ”Any language in BQP has a QPIP, and moreover, a fault tolerant one”. We provide two proofs. The simpler one uses a new (possibly of independent interest) quantum authentication scheme (QAS) based on random Clifford elements. This QPIP however, is not fault tolerant. Our � �

[1]  Christoph Dankert,et al.  Exact and Approximate Unitary 2-Designs: Constructions and Applications , 2006, quant-ph/0606161.

[2]  Sanjeev Arora,et al.  Computational Complexity: A Modern Approach , 2009 .

[3]  Charles H. Bennett,et al.  Quantum cryptography without Bell's theorem. , 1992, Physical review letters.

[4]  Ben Reichardt,et al.  Fault-Tolerant Quantum Computation , 2016, Encyclopedia of Algorithms.

[5]  Martín Abadi,et al.  On hiding information from an oracle , 1987, STOC '87.

[6]  E. Knill,et al.  Randomized Benchmarking of Quantum Gates , 2007, 0707.0963.

[7]  Elham Kashefi,et al.  Demonstration of Blind Quantum Computing , 2011, Science.

[8]  Dorit Aharonov,et al.  Polynomial simulations of decohered quantum computers , 1996, Proceedings of 37th Conference on Foundations of Computer Science.

[9]  Adam D. Smith,et al.  Authentication of quantum messages , 2001, The 43rd Annual IEEE Symposium on Foundations of Computer Science, 2002. Proceedings..

[10]  Andris Ambainis,et al.  Nonmalleable encryption of quantum information , 2008, 0808.0353.

[11]  Scott Aaronson,et al.  BQP and the polynomial hierarchy , 2009, STOC '10.

[12]  Debbie W. Leung,et al.  Quantum data hiding , 2002, IEEE Trans. Inf. Theory.

[13]  Mikhail N. Vyalyi,et al.  Classical and Quantum Computation , 2002, Graduate studies in mathematics.

[14]  John Preskill,et al.  Topological Quantum Computation , 1998, QCQC.

[15]  Andrew M. Childs Secure assisted quantum computation , 2001, Quantum Inf. Comput..

[16]  E. Knill,et al.  Resilient Quantum Computation , 1998 .

[17]  Yael Tauman Kalai,et al.  Delegating computation: interactive proofs for muggles , 2008, STOC.

[18]  László Lovász,et al.  Approximate Counting and Quantum Computation , 2005, Combinatorics, Probability and Computing.

[19]  Julia Kempe,et al.  The Complexity of the Local Hamiltonian Problem , 2004, FSTTCS.

[20]  Dorit Aharonov,et al.  Fault-tolerant quantum computation with constant error , 1997, STOC '97.

[21]  Shengyu Zhang,et al.  Several natural BQP-Complete problems , 2006, quant-ph/0606179.

[22]  E. Kashefi,et al.  Unconditionally verifiable blind computation , 2012 .

[23]  A. Kitaev,et al.  Universal quantum computation with ideal Clifford gates and noisy ancillas (14 pages) , 2004, quant-ph/0403025.

[24]  Andris Ambainis,et al.  Quantum t-designs: t-wise Independence in the Quantum World , 2007, Twenty-Second Annual IEEE Conference on Computational Complexity (CCC'07).

[25]  Raymond Laflamme,et al.  Quantum computing and quadratically signed weight enumerators , 2001, Inf. Process. Lett..

[26]  Aaron Roodman,et al.  Blind Analysis in Particle Physics , 2003 .

[27]  Dorit Aharonov,et al.  A Polynomial Quantum Algorithm for Approximating the Jones Polynomial , 2008, Algorithmica.

[29]  Charles Herder BLIND QUANTUM COMPUTATION , 2012 .

[30]  Umesh Vazirani,et al.  Is Quantum Mechanics Falsifiable? A computational perspective on the foundations of Quantum Mechanics , 2012, 1206.3686.

[31]  John Watrous,et al.  PSPACE has constant-round quantum interactive proof systems , 1999, 40th Annual Symposium on Foundations of Computer Science (Cat. No.99CB37039).

[32]  Peter W. Shor,et al.  Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer , 1995, SIAM Rev..

[33]  Dorit Aharonov,et al.  Fault-tolerant Quantum Computation with Constant Error Rate * , 1999 .

[34]  Avinatan Hassidim,et al.  Secure Multiparty Quantum Computation with (Only) a Strict Honest Majority , 2006, 2006 47th Annual IEEE Symposium on Foundations of Computer Science (FOCS'06).

[35]  Thierry Paul,et al.  Quantum computation and quantum information , 2007, Mathematical Structures in Computer Science.

[36]  Christoph Dankert,et al.  Exact and approximate unitary 2-designs and their application to fidelity estimation , 2009 .

[37]  Elham Kashefi,et al.  Universal Blind Quantum Computation , 2008, 2009 50th Annual IEEE Symposium on Foundations of Computer Science.

[38]  John Watrous,et al.  Space-Bounded Quantum Complexity , 1999, J. Comput. Syst. Sci..

[39]  Dorit Aharonov,et al.  The BQP-hardness of approximating the Jones polynomial , 2006, ArXiv.

[40]  Silvio Micali,et al.  The knowledge complexity of interactive proof-systems , 1985, STOC '85.