Set Membership with Two Classical and Quantum Bit Probes

Authors Shyam S. Dhamapurkar, Shubham Vivek Pawar, Jaikumar Radhakrishnan



PDF
Thumbnail PDF

File

LIPIcs.ICALP.2022.52.pdf
  • Filesize: 0.76 MB
  • 19 pages

Document Identifiers

Author Details

Shyam S. Dhamapurkar
  • Southern University of Science and Technology, Shenzhen, China
Shubham Vivek Pawar
  • Hubli, Karnataka, India
Jaikumar Radhakrishnan
  • Tata Institute of Fundamental Research, Mumbai, India

Cite As Get BibTex

Shyam S. Dhamapurkar, Shubham Vivek Pawar, and Jaikumar Radhakrishnan. Set Membership with Two Classical and Quantum Bit Probes. In 49th International Colloquium on Automata, Languages, and Programming (ICALP 2022). Leibniz International Proceedings in Informatics (LIPIcs), Volume 229, pp. 52:1-52:19, Schloss Dagstuhl – Leibniz-Zentrum fΓΌr Informatik (2022) https://doi.org/10.4230/LIPIcs.ICALP.2022.52

Abstract

We study the classical and quantum bit-probe versions of the static set membership problem : Given a subset, S (|S| ≀ n) of a universe, 𝒰 (|𝒰| = m ≫ n), represent it as a binary string in memory so that the query "Is x in S?" (x ∈ 𝒰) can be answered by making at most t probes into the string. Let s_{A}(m,n,t) denote the minimum length of the bit string in any scheme that solves this static set membership problem. We show that for n β‰₯ 4
s_A(m,n,t = 2) = 
π’ͺ(m^{1-1/(n-1)})  (if n = 0 (mod 3));
π’ͺ(m^{1-1/n}) (if n = 1,2 (mod 3));
π’ͺ(m^{6/7}) (if n = 8,9).
These bounds are shown using a common scheme that is based on a graph-theoretic observation on orienting the edges of a graph of high girth. For all n β‰₯ 4, these bounds substantially improve on the previous best bounds known for this problem, some of which required elaborate constructions [Mirza Galib Anwarul Husain Baig and Deepanjan Kesh, 2020]. Our schemes are explicit. A lower bound of the form s_A(m,n,2) = Ξ©(m^{1-1/⌊{n/4}βŒ‹}) was known for this problem. We show an improved lower bound of s_A(m,n,2) = Ξ©(m^{1-2/(n+3)}); this bound was previously known only for n = 3,5 [Mirza Galib Anwarul Husain Baig and Deepanjan Kesh, 2020; Mirza Galib Anwarul Husain Baig et al., 2019; Mirza Galib Anwarul Husain Baig and Deepanjan Kesh, 2018; Mirza Galib Anwarul Husain Baig et al., 2019; Mirza Galib Anwarul Husain Baig and Deepanjan Kesh, 2020]. 
We consider the quantum version of the problem, where access to the bit-string b ∈ {0,1}^s is provided in the form of a quantum oracle that performs the transformation π’ͺ_b: |i⟩ ↦ (-1)^{b_i} |i⟩. Let s_Q(m,n,2) denote the minimum length of the bit string that solves the above set membership problem in the quantum model (with adaptive queries but no error). We show that for all n ≀ m^{1/8}, we have s_{QA}(m,n,2) = π’ͺ(m^{7/8}). This upper bound makes crucial use of Nash-William’s theorem [Diestel, 2005] for decomposing a graph into forests. This result is significant because, prior to this work, it was not known if quantum schemes yield any advantage over classical schemes. We also consider schemes that make a small number of quantum non-adaptive probes. In particular, we show that the space required in this case, s_{QN}(m,n = 2,t = 2) = O(√m) and s_{QN}(m,n = 2,t = 3) = O(m^{1/3}); in contrast, it is known that two non-adaptive classical probes yield no savings. Our quantum schemes are simple and use only the fact that the XOR of two bits of memory can be computed using just one quantum query to the oracle.

Subject Classification

ACM Subject Classification
  • Theory of computation
  • Theory of computation β†’ Computational complexity and cryptography
Keywords
  • set membership problem
  • bit probe complexity
  • graphs with high girth
  • quantum data structure

Metrics

  • Access Statistics
  • Total Accesses (updated on a weekly basis)
    0
    PDF Downloads

References

  1. Noga Alon and Uriel Feige. On the power of two, three and four probes. In Claire Mathieu, editor, Proceedings of the Twentieth Annual ACM-SIAM Symposium on Discrete Algorithms, SODA 2009, New York, NY, USA, January 4-6, 2009, pages 346-354. SIAM, 2009. URL: http://dl.acm.org/citation.cfm?id=1496770.1496809.
  2. Mirza Galib Anwarul Husain Baig and Deepanjan Kesh. Two new schemes in the bitprobe model. In M. Sohel Rahman, Wing-Kin Sung, and Ryuhei Uehara, editors, WALCOM: Algorithms and Computation - 12th International Conference, WALCOM 2018, Dhaka, Bangladesh, March 3-5, 2018, Proceedings, volume 10755 of Lecture Notes in Computer Science, pages 68-79. Springer, 2018. URL: https://doi.org/10.1007/978-3-319-75172-6_7.
  3. Mirza Galib Anwarul Husain Baig and Deepanjan Kesh. Improved bounds for two query adaptive bitprobe schemes storing five elements. CoRR, abs/1910.03651, 2019. URL: http://arxiv.org/abs/1910.03651,
  4. Mirza Galib Anwarul Husain Baig and Deepanjan Kesh. Improved bounds for two query adaptive bitprobe schemes storing five elements. Theor. Comput. Sci., 838:208-230, 2020. URL: https://doi.org/10.1016/j.tcs.2020.07.036.
  5. Mirza Galib Anwarul Husain Baig and Deepanjan Kesh. Two improved schemes in the bitprobe model. Theoretical Computer Science, 806:543-552, 2020. URL: https://doi.org/10.1016/j.tcs.2019.08.033.
  6. Mirza Galib Anwarul Husain Baig, Deepanjan Kesh, and Chirag Sodani. An improved scheme in the two query adaptive bitprobe model. In Charles J. Colbourn, Roberto Grossi, and Nadia Pisanti, editors, Combinatorial Algorithms - 30th International Workshop, IWOCA 2019, Pisa, Italy, July 23-25, 2019, Proceedings, volume 11638 of Lecture Notes in Computer Science, pages 22-34. Springer, 2019. URL: https://doi.org/10.1007/978-3-030-25005-8_3.
  7. Mirza Galib Anwarul Husain Baig, Deepanjan Kesh, and Chirag Sodani. A two query adaptive bitprobe scheme storing five elements. In Gautam K. Das, Partha Sarathi Mandal, Krishnendu Mukhopadhyaya, and Shin-Ichi Nakano, editors, WALCOM: Algorithms and Computation - 13th International Conference, WALCOM 2019, Guwahati, India, February 27 - March 2, 2019, Proceedings, volume 11355 of Lecture Notes in Computer Science, pages 317-328. Springer, 2019. URL: https://doi.org/10.1007/978-3-030-10564-8_25.
  8. Clark T. Benson. Minimal regular graphs of girths eight and twelve. Canadian Journal of Mathematics, 18:1091-1094, 1966. URL: https://doi.org/10.4153/CJM-1966-109-8.
  9. H. Buhrman, P. B. Miltersen, J. Radhakrishnan, and S. Venkatesh. Are bitvectors optimal? SIAM J. Comput., 31(6):1723-1744, June 2002. URL: https://doi.org/10.1137/S0097539702405292.
  10. Reinhard Diestel. Graph Theory (Graduate Texts in Mathematics). Springer, August 2005. Google Scholar
  11. Mohit Garg and Jaikumar Radhakrishnan. Set membership with non-adaptive bit probes. In Proc. 34th Symposium on Theoretical Aspects of Computer Science, STACS 2017, March 8-11, 2017, Hannover, Germany, pages 38:1-38:13, 2017. URL: https://doi.org/10.4230/LIPIcs.STACS.2017.38.
  12. Mohit Garg and Jaikumar Radhakrishnan. Set membership with a few bit probes. In Proc. 26th Annual ACM-SIAM Symposium on Discrete Algorithms, SODA, pages 776-784, San Diego, CA, USA, January 4-6, 2015. URL: https://doi.org/10.1137/1.9781611973730.53.
  13. Deepanjan Kesh. Space Complexity of Two Adaptive Bitprobe Schemes Storing Three Elements. In Sumit Ganguly and Paritosh Pandya, editors, 38th IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS 2018), volume 122 of Leibniz International Proceedings in Informatics (LIPIcs), pages 12:1-12:12, Dagstuhl, Germany, 2018. Schloss Dagstuhl-Leibniz-Zentrum fuer Informatik. URL: https://doi.org/10.4230/LIPIcs.FSTTCS.2018.12.
  14. Felix Lazebnik, V. Ustimenko, and Andrew Woldar. A new series of dense graphs of high girth. Bull. AMS, 32, December 1994. URL: https://doi.org/10.1090/S0273-0979-1995-00569-0.
  15. Moshe Lewenstein, J. Ian Munro, Patrick K. Nicholson, and Venkatesh Raman. Improved explicit data structures in the bitprobe model. In Andreas S. Schulz and Dorothea Wagner, editors, Algorithms - ESA 2014 - 22th Annual European Symposium, Wroclaw, Poland, September 8-10, 2014. Proceedings, volume 8737 of Lecture Notes in Computer Science, pages 630-641. Springer, 2014. URL: https://doi.org/10.1007/978-3-662-44777-2_52.
  16. Michael A. Nielsen and Isaac L. Chuang. Quantum Computation and Quantum Information (10th Anniversary edition). Cambridge University Press, 2016. URL: https://www.cambridge.org/de/academic/subjects/physics/quantum-physics-quantum-information-and-quantum-computation/quantum-computation-and-quantum-information-10th-anniversary-edition?format=HB.
  17. Jaikumar Radhakrishnan, Venkatesh Raman, and S. Srinivasa Rao. Explicit deterministic constructions for membership in the bitprobe model. In Friedhelm Meyer auf der Heide, editor, Algorithms - ESA 2001, 9th Annual European Symposium, Aarhus, Denmark, August 28-31, 2001, Proceedings, volume 2161 of Lecture Notes in Computer Science, pages 290-299. Springer, 2001. URL: https://doi.org/10.1007/3-540-44676-1_24.
  18. Jaikumar Radhakrishnan, Pranab Sen, and Srinivasan Venkatesh. The quantum complexity of set membership. In 41st Annual Symposium on Foundations of Computer Science, FOCS 2000, 12-14 November 2000, Redondo Beach, California, USA, pages 554-562. IEEE Computer Society, 2000. URL: https://doi.org/10.1109/SFCS.2000.892143.
  19. Jaikumar Radhakrishnan, Smit Shah, and Saswata Shannigrahi. Data structures for storing small sets in the bitprobe model. In Proc. 18th Annual European Symposium on Algorithms Algorithms, pages 159-170, Liverpool, UK, September 6-8, 2010. URL: https://doi.org/10.1007/978-3-642-15781-3_14.
  20. R Wenger. Extremal graphs with no c4’s, c6’s, or c10’s. Journal of Combinatorial Theory, Series B, 52(1):113-116, 1991. URL: https://doi.org/10.1016/0095-8956(91)90097-4.
Questions / Remarks / Feedback
X

Feedback for Dagstuhl Publishing


Thanks for your feedback!

Feedback submitted

Could not send message

Please try again later or send an E-mail