Shadow tomography of quantum states

We introduce the problem of *shadow tomography*: given an unknown D-dimensional quantum mixed state ρ, as well as known two-outcome measurements E1,…,EM, estimate the probability that Ei accepts ρ, to within additive error ε, for each of the M measurements. How many copies of ρ are needed to achieve this, with high probability? Surprisingly, we give a procedure that solves the problem by measuring only O( ε−5·log4 M·logD) copies. This means, for example, that we can learn the behavior of an arbitrary n-qubit state, on *all* accepting/rejecting circuits of some fixed polynomial size, by measuring only nO( 1) copies of the state. This resolves an open problem of the author, which arose from his work on private-key quantum money schemes, but which also has applications to quantum copy-protected software, quantum advice, and quantum one-way communication. Recently, building on this work, Brandão et al. have given a different approach to shadow tomography using semidefinite programming, which achieves a savings in computation time.

[1]  Harumichi Nishimura,et al.  Polynomial time quantum computation with advice , 2003, Inf. Process. Lett..

[2]  A. Winter,et al.  Aspects of Generic Entanglement , 2004, quant-ph/0407049.

[3]  Greg Kuperberg,et al.  Quantum versus Classical Proofs and Advice , 2006, Twenty-Second Annual IEEE Conference on Computational Complexity (CCC'07).

[4]  Scott Aaronson,et al.  QMA/qpoly Is Contained In PSPACE/poly: De-Merlinizing Quantum Protocols , 2005, Electron. Colloquium Comput. Complex..

[5]  Ryan O'Donnell,et al.  Efficient quantum tomography , 2015, STOC.

[6]  Emanuel Knill,et al.  The quantum query complexity of the hidden subgroup problem is polynomial , 2004, Inf. Process. Lett..

[7]  Scott Aaronson,et al.  The Complexity of Quantum States and Transformations: From Quantum Money to Black Holes , 2016, Electron. Colloquium Comput. Complex..

[8]  Avinatan Hassidim,et al.  Quantum state restoration and single-copy tomography for ground states of Hamiltonians. , 2009, Physical review letters.

[9]  Ashley Montanaro,et al.  Learning stabilizer states by Bell sampling , 2017, 1707.04012.

[10]  Stuart A. Aaronson Growth Factor and Receptor Tyrosine Kinases , 2005, Science's STKE.

[11]  Scott Aaronson,et al.  Limitations of quantum advice and one-way communication , 2004, Proceedings. 19th IEEE Annual Conference on Computational Complexity, 2004..

[12]  O. Gühne,et al.  03 21 7 2 3 M ar 2 00 6 Scalable multi-particle entanglement of trapped ions , 2006 .

[13]  Scott Aaronson,et al.  Quantum money from hidden subspaces , 2012, STOC '12.

[14]  Krysta Marie Svore,et al.  Quantum Speed-Ups for Solving Semidefinite Programs , 2017, 2017 IEEE 58th Annual Symposium on Foundations of Computer Science (FOCS).

[15]  Stephen Wiesner,et al.  Conjugate coding , 1983, SIGA.

[16]  Xiaodi Wu,et al.  Exponential Quantum Speed-ups for Semidefinite Programming with Applications to Quantum Learning , 2017, ArXiv.

[17]  Scott Aaronson,et al.  A full characterization of quantum advice , 2010, STOC '10.

[18]  Alon Orlitsky,et al.  On Learning Distributions from their Samples , 2015, COLT.

[19]  Avinatan Hassidim,et al.  Quantum state restoration and single-copy tomography , 2009 .

[20]  Andreas J. Winter,et al.  Coding theorem and strong converse for quantum channels , 1999, IEEE Trans. Inf. Theory.

[21]  Stephen Becker,et al.  Quantum state tomography via compressed sensing. , 2009, Physical review letters.

[22]  Gilles Brassard,et al.  Quantum Cryptography, or Unforgeable Subway Tokens , 1982, CRYPTO.

[23]  Abel Molina,et al.  Optimal Counterfeiting Attacks and Generalizations for Wiesner's Quantum Money , 2012, TQC.

[24]  Ashwin Nayak,et al.  Online learning of quantum states , 2018, NeurIPS.

[25]  Scott Aaronson,et al.  Quantum computing, postselection, and probabilistic polynomial-time , 2004, Proceedings of the Royal Society A: Mathematical, Physical and Engineering Sciences.

[26]  Rudolf Ahlswede,et al.  Strong converse for identification via quantum channels , 2000, IEEE Trans. Inf. Theory.

[27]  Gilles Brassard,et al.  Quantum Cryptography , 2005, Encyclopedia of Cryptography and Security.

[28]  Todd A. Brun,et al.  Quantum Computing , 2011, Computer Science, The Hardware, Software and Heart of It.

[29]  Jian-Wei Pan,et al.  10-Qubit Entanglement and Parallel Logic Operations with a Superconducting Circuit. , 2017, Physical review letters.

[30]  Chris Marriott,et al.  Quantum Arthur–Merlin games , 2004, Proceedings. 19th IEEE Annual Conference on Computational Complexity, 2004..

[31]  Mark M. Wilde,et al.  Sequential decoding of a general classical-quantum channel , 2013, Proceedings of the Royal Society A: Mathematical, Physical and Engineering Sciences.

[32]  Xiaodi Wu,et al.  Sample-Optimal Tomography of Quantum States , 2015, IEEE Transactions on Information Theory.

[33]  Ashley Montanaro,et al.  Sequential measurements, disturbance and property testing , 2016, SODA.

[34]  Leslie G. Valiant,et al.  A theory of the learnable , 1984, STOC '84.

[35]  Scott Aaronson,et al.  The learnability of quantum states , 2006, Proceedings of the Royal Society A: Mathematical, Physical and Engineering Sciences.

[36]  Scott Aaronson,et al.  Quantum Copy-Protection and Quantum Money , 2009, 2009 24th Annual IEEE Conference on Computational Complexity.