Abstract 1 Introduction 2 Preliminaries 3 Lower bounds from function rank 4 A new lower bound technique for CDS 5 Application to concrete functions 6 Discussion References Appendix A 𝛀(𝟏) lower bounds on entanglement in 𝒇-routing

Rank Lower Bounds on Non-Local Quantum Computation

Vahid R. Asadi ORCID University of Waterloo, Canada Eric Culf University of Waterloo, Canada Alex May ORCID Perimeter Institute for Theoretical Physics, Waterloo, Canada
University of Waterloo, Canada
Abstract

A non-local quantum computation (NLQC) replaces an interaction between two quantum systems with a single simultaneous round of communication and shared entanglement. We study two classes of NLQC, f-routing and f-BB84, which are of relevance to classical information theoretic cryptography and quantum position-verification. We give the first non-trivial lower bounds on entanglement in both settings, but are restricted to lower bounding protocols with perfect correctness. Within this setting, we give a lower bound on the Schmidt rank of any entangled state that completes these tasks for a given function f(x,y) in terms of the rank of a matrix g(x,y) whose entries are zero when f(x,y)=0, and strictly positive otherwise. This also leads to a lower bound on the Schmidt rank in terms of the non-deterministic quantum communication complexity of f(x,y). Because of a relationship between f-routing and the conditional disclosure of secrets (CDS) primitive studied in information theoretic cryptography, we obtain a new technique for lower bounding the randomness complexity of CDS.

Keywords and phrases:
Non-local quantum computation, quantum position-verification, conditional disclosure of secrets
Funding:
Alex May: Supported by the Perimeter Institute for Theoretical Physics. Research at Perimeter Institute is supported in part by the Government of Canada through the Department of Innovation, Science and Economic Development Canada and by the Province of Ontario through the Ministry of Colleges and Universities.
Copyright and License:
[Uncaptioned image] © Vahid R. Asadi, Eric Culf, and Alex May; licensed under Creative Commons License CC-BY 4.0
2012 ACM Subject Classification:
Theory of computation Quantum information theory
Acknowledgements:
We thank Richard Cleve for helpful discussions during the development of this project. Harry Buhrman and François Le Gall suggested a connection between our bounds and non-deterministic rank, and consequently to non-deterministic quantum communication complexity.
Editors:
Raghu Meka

1 Introduction

A non-local quantum computation (NLQC) replaces a local interaction with entanglement and a single simultaneous round of communication. See Figure 1. NLQC has applications in a number of areas, including quantum position-verification [19, 18, 20], Hamiltonian simulation [3], the AdS/CFT correspondence [21, 24, 22, 23], and information theoretic cryptography [2]. In all of these settings, we are interested in understanding the resources necessary to implement a given computation in the non-local form. Lower bounds on the entanglement necessary to complete a non-local computation are so far poorly understood but are central to these applications.

Two important classes of non-local computations are f-routing and f-BB84, both initially studied in the context of quantum position-verification [18, 10]. These computations involve classical inputs of size n and O(1) size quantum inputs. The local implementation of these computations involves computing a classical function f from the classical inputs, then doing O(1) quantum operations conditioned on the outcome. A longstanding goal has been to prove that the non-local implementation of the same computation requires growing quantum resources, and in particular growing entanglement. Recently, a bound on the quantum system size was proven in [10], but this assumes a purified view that absorbs classical processing into the quantum part of the computation.111See [6] for more discussion of this point. Another approach appears in [6], which bounds the number of quantum gates required in the non-local implementation. Here, we achieve the goal of lower bounding entanglement, at least as quantified by the Schmidt rank of the shared system, but at the cost of only considering protocols that complete f-routing or f-BB84 with perfect fidelity.222Actually, we will see that in the case of f-routing we only need zero error on either (x,y)f1(0) with bounded error for (x,y)f1(1), or vice versa.

(a)
(b)
Figure 1: Local and non-local computations. a) A channel 𝒯ABAB is implemented by directly interacting the input systems. b) A non-local quantum computation. The goal is for the action of this circuit on the AB systems to approximate the channel 𝒯ABAB.

It is a striking feature of non-local quantum computation that these mostly classical local computations require large quantum entanglement to implement non-locally. Beyond this, establishing this quantum-classical separation is relevant for quantum position-verification and for information theoretic cryptography. In a QPV scheme, we want to find operations that are as easy as possible for the honest player (who acts locally) to implement, but as hard as possible for the dishonest player (who implements an NLQC). Proving entanglement lower bounds for f-routing or f-BB84 gives a verification scheme where the honest player implements a nearly classical computation, while the dishonest player needs large quantum resources. This establishes the security of such QPV schemes under a bounded entanglement assumption. Our bound is only in the perfect setting and hence not immediately relevant to practical schemes, but represents a step towards proving entanglement lower bounds in the robust setting.333Many entanglement lower bounds apply in the robust setting, see e.g. [25, 16, 23, 9], but none grow with the classical input size. We achieve growth with classical input size at the expense of robustness.

Also relevant to our work is the connection between NLQC and information theoretic cryptography. In information theoretic cryptography, we wish to understand the communication and randomness cost to establish information theoretic privacy in various cryptographic settings. A primitive known as conditional disclosure of secrets (CDS) has been identified as one of the simplest settings where one can hope to understand the cost of privacy. CDS was initially studied in the context of private information retrieval [17], has applications in secret sharing [4], and shares a number of connections to communication complexity and interactive proofs [5]. In [2], f-routing was shown to be closely related to CDS: lower bounds on entanglement cost in f-routing give lower bounds on randomness in CDS. This opens a new avenue for quantum information techniques to make contributions to classical information theoretic cryptography.

1.1 Summary of our results

An f-routing task is defined by a choice of Boolean function f:{0,1}n×{0,1}n{0,1}. In the task, Alice, on the left, receives a quantum system Q of O(1) size and a classical string x{0,1}n. Bob, on the right, receives y{0,1}n. Their goal is to bring Q to Alice if f(x,y)=0, and to Bob if f(x,y)=1. In the setting of non-local computation, Alice and Bob may only use shared entanglement and a single round of communication to accomplish this. A difficulty in accomplishing this task arises since quantum mechanics prevents the system in register Q from being copied, and hence apparently Alice is forced to decide alone whether to keep or send Q. Furthermore, she doesn’t know where Q is needed until learning y, at which point the single round of communication has already passed.

Despite the difficulty, the f-routing task can be completed for arbitrary functions f, with the most efficient known protocols using 2Θ(nlogn) entanglement and communication for arbitrary functions [2], and efficient protocols known for some low complexity classes of functions [13, 12]. So far, only an O(1) lower bound is known on entanglement in f-routing, as we review in Appendix A. Here, we prove a new lower bound on f-routing with one-sided perfection. We define a (ϵ0,ϵ1)-correct f-routing scheme as one which brings Q to the left with fidelity at least 1ϵ0 when (x,y)f1(0) and brings Q to the right with fidelity at least 1ϵ1 when (x,y)f1(1). Define FR0(f) as the log of the minimal Schmidt rank of any entangled state that suffices to complete f-routing with ϵ0=0, ϵ1>0 for the function f, and FR1(f) as the analogous quantity with ϵ0>0,ϵ1=0. We prove the bounds

FR0(f) 14logrank(g|f),
FR1(f) 14logrank(g|¬f), (1)

where g|f(x,y) is a real-valued function that satisfies f(x,y)=0g(x,y)=0. For some natural functions, this provides explicit strong lower bounds. For instance, taking f=EQ to be the equality function, we are assured g(x,y) is diagonal with non-zero entries on the diagonal and hence is of full rank, therefore FR0(EQ)n/4. Similarly, we obtain linear lower bounds on FR1(NEQ) where NEQ is the non-equality function.

As mentioned above, f-routing is related closely to the conditional disclosure of secrets (CDS) primitive. A CDS instance is defined by a choice of Boolean function f:{0,1}n×{0,1}n{0,1}. In CDS, Alice and Bob receive inputs x{0,1}n and y{0,1}n respectively, while Alice additionally holds a secret string s{0,1}k. Alice and Bob share randomness, and send messages to a referee. Their goal is for the referee to be able to determine s if and only if f(x,y)=1.

In [2], it was shown that the randomness cost of CDS for a function f upper bounds the entanglement cost of an f-routing scheme for the same function. Because of this, our lower bounds on entanglement in f-routing imply the same lower bounds on randomness in CDS. Because we only need one sided perfection for our bounds to apply, it is possible to bound CDS with imperfect correctness and perfect privacy (ppCDS), or perfect correctness but imperfect privacy (pcCDS)

ppCDS(f) Ω(logrank(g|f)),
pcCDS(f) Ω(logrank(g|¬f)).

The expressions on the left hand side denote randomness costs. This provides a new technique for bounding randomness in CDS, which is proven using the quantum information perspective but can be phrased purely in terms of classical quantities.

We also prove lower bounds against the f-BB84 class of non-local quantum computations. An f-BB84 task is defined by a choice of Boolean function f(x,y) with x{0,1}n given to Alice and y{0,1}n given to Bob. The system Q is in one of the BB84 states {Hf(x,y)|b}, with b{0,1} and f(x,y){0,1}. Alice and Bob should both output b.

The f-BB84 task can be completed for arbitrary functions f, with the most efficient known protocols using 2Θ(n) entanglement and communication for arbitrary functions [12].444Note that [12] deals with the f-routing task, but their protocol is easily adapted to f-BB84. We prove lower bounds on the log of the Schmidt rank of any resource state that suffices to complete f-BB84 with probability 1. In particular, the same bound as in the f-routing case applies,

FBB84(f)14logrank(g|f),

where again g is a function with zeros exactly at the zeros of f. In a practical setting, f-BB84 is of particular interest because it can be made loss-tolerant [1]. Unfortunately, our bound does not carry over to the noisy setting, so is not of immediate practical value. Nonetheless, our bound is the first non-trivial entanglement bound on f-BB84. For f-BB84, the bound above leads to linear lower bounds for the equality, non-equality, set-disjointness, and greater-than functions.

We can better understand our lower bounds by relating them to communication complexity. In a quantum communication complexity protocol, Alice holds x{0,1}n, Bob holds y{0,1}n, and Alice and Bob communicate qubits to determine f(x,y). The number of qubits of communication needed for Alice and Bob to output 1 with non-zero probability when f(x,y)=1, and never output 1 when f(x,y)=0 is known as the quantum non-deterministic communication complexity, QNPcc(f). Using the characterization of QNPcc in terms of the non-deterministic rank [14, 15], we obtain

logrankg|f (QNPcc(f)1),
logrankg|¬f (coQNPcc(f)1).

This relates our lower bounds on CDS, f-routing, and f-BB84 to communication complexity.

2 Preliminaries

We let ΨAB+ denote the maximally entangled state on AB, so that

|Ψ+AB=1di=1d|iA|iB,

and ΨAB+=|Ψ+Ψ+|AB.

Given two density matrices ρ,σ, we define the fidelity by

F(ρ,σ)=trσρσ.

The fidelity is related to the one-norm distance by the Fuchs–van de Graff inequalities,

1F(ρ,σ)12ρσ11(F(ρ,σ))2.

The von Neumann entropy is defined by

S(A)=tr(ρlogρ).

The quantum mutual information is defined by

I(A:B)ρ=S(A)ρ+S(B)ρS(AB)ρ,

and the conditional mutual information is defined by

S(A|B)ρ=S(AB)ρS(B)ρ.

We will also make use of the following statement of continuity of the conditional entropy [26],

Theorem 1 ([26]).

Suppose that

12ρABσAB1ϵ,

and let h(x)=xlogx(1x)log(1x) be the binary entropy function. Then

|S(A|B)ρS(A|B)σ|2ϵlogdA+(1+ϵ)h(ϵ1+ϵ).

We will also make use of the following observation.

Observation 2.

Let ρAB be a density matrix on the AB system, d be the dimension of subsystem A, and ρB be the marginal of ρAB on the subsystem B. Then we have

tr(ρABAdρB)2 =tr(ρAB2+Ad2ρB22ρAB(AdρB))
=tr(ρAB2)+1d2tr(A)tr(ρB2)2dtrB(ρB2)
=tr(ρAB2)1dtr(ρB2)
=tr(ρAB2)tr(Ad2ρB2).

2.1 Communication complexity

We need some definitions and results from communication complexity. Consider two parties, Alice and Bob, with Alice given input x{0,1}n and Bob given input y{0,1}n. Alice and Bob exchange messages and Alice outputs a bit z. The non-deterministic quantum communication complexity QNPcc(f), introduced in [14], is the minimal number of qubits Alice and Bob need to exchange to both output 1 with probability larger than zero when f(x,y)=1 and both output 0 with probability 1 when f(x,y)=0.

A matrix M is called a non-deterministic communication complexity matrix for f exactly when M(x,y)0 when f(x,y)=1. The non-zero entries are allowed to be any complex numbers. The minimal rank of any non-deterministic communication complexity matrix for f is denoted by nrank(f) and called the non-deterministic rank. We have the following result from [15].

Theorem 3 ([15]).

The non-deterministic rank and the non-deterministic quantum communication complexity are related by

QNPcc(f)=log(nrank(f))+1.

3 Lower bounds from function rank

In this section, we first start by defining and analyzing the f-routing task, and then prove our result in this setting. Next, we will show similar lower bounds for f-BB84.

3.1 𝒇-routing bounds from function rank

(a)
(b)
Figure 2: a) General NLQC implementing a f-routing position-verification scheme. The first round operations are quantum channels that depend on the inputs x{0,1}n and y{0,1}n. In the second round, Alice and Bob apply channels mapping to qubit systems A, B. If f(x,y)=0 A should be maximally entangled with the reference Q¯. If f(x,y)=1 then B should be maximally entangled with R. b) Non-local quantum computation implementing a f-BB84 position-verification scheme. The first round operations are quantum channels that depend on the inputs x{0,1}n and y{0,1}n. They communicate in one simultaneous exchange, and then apply measurements to their local systems. They succeed if b=b=b′′, with b determined by measuring a reference maximally entangled with Q.

We begin with a definition of an f-routing task.

Definition 4.

A qubit 𝐟-routing task is defined by a choice of Boolean function f:{0,1}2n{0,1}, and a 2 dimensional Hilbert space Q. Inputs x{0,1}n and system Q are given to Alice, and input y{0,1}n is given to Bob. Alice and Bob exchange one round of communication, with the combined systems received or kept by Bob labelled M and the systems received or kept by Alice labelled M. Label the combined actions of Alice and Bob in the first round as 𝒩QMMx,y. The qubit f-routing task is completed (ϵ0,ϵ1)-correctly on an input (x,y) if there exists a channel 𝒟MQx,y such that,

whenf(x,y)=0,F(𝒟MQx,ytrM𝒩QMMx,y(ΨQ¯Q+),ΨQ¯Q+)1ϵ0,

and there exists a channel 𝒟MQx,y such that

whenf(x,y)=1,F(𝒟MQx,ytrM𝒩QMMx,y(ΨQ¯Q+),ΨQ¯Q+)1ϵ1.

In words, Alice can recover Q if f(x,y)=0 and Bob can recover Q if f(x,y)=1.

See the system labels shown in Figure 2(a). Note that we label M0M1=M, M0M1=M.

We will focus on f-routing with ϵ0=0, ϵ10 so that the protocol is perfectly correct on zero instances of f(x,y), or with ϵ0>0 and ϵ1=0 so that the protocol is perfectly correct on 1 instances. We define the entanglement cost of an f-routing protocol to be the log of the minimal Schmidt rank of any resource system that can be used to perform the f-routing task. In notation, we define FR0(f) to be entanglement cost for f-routing with ϵ0=0, ϵ1=0.05, FR1(f) to be the entanglement cost when ϵ0=0.05, ϵ1=0.

Towards a lower bound in this setting, we first observe that ρQ¯M=ρQ¯ρM iff f(x,y)=0. We show this in the following lemma.

Lemma 5.

Suppose an f-routing protocol is perfectly correct on zero instances, and ϵ1<ϵ1 correct on 1 instances, where ϵ1 depends on dQ but is lower bounded by a constant. Then the mid-protocol state it produces, ρQ¯M, satisfies ρQ¯M=ρQ¯ρM if and only if f(x,y)=0.

Proof.

By correctness on 0 instances, we have that

whenf(x,y)=0,F(𝒟MQx,ytrM𝒩QMMx,y(ΨQ¯Q+),ΨQ¯Q+)=1,

hence f(x,y)=0 implies Alice can produce a Bell state |Ψ+Q¯Q. By data processing we have

2n=I(Q¯:Q)ΨQ¯Q+I(Q¯:M)ρQ¯M,

but we also have the inequality

I(Q¯:M)ρ+I(Q¯:M)ρ2S(Q¯),

so that I(Q¯:M)=0, which implies

ρQ¯M=ρQ¯ρM,

as needed. Conversely, if f(x,y)=1 we cannot have ρQ¯M=ρQ¯ρM. To see why, first recall that f-routing which is ϵ1-correct on 1 instances has that there exists a family of channels {DMQx,y}x,y such that

whenf(x,y)=1,F(𝒟MQx,ytrM𝒩QMMx,y(ΨQ¯Q+),ΨQ¯Q+)1ϵ1.

Define

σQ¯Q=𝒟MQx,y(ρQ¯M),

and use that by data processing,

I(Q¯:M)ρQ¯MI(Q¯:Q)σQ¯Q.

But then by the Fuchs–van de Graff inequalities σQ¯Q is close in trace distance to ΨQ¯Q+,

12ΨQ¯Q+σQ¯Q12ϵ1ϵ12μ,

and by continuity of the conditional entropy,

I(Q¯:Q)Ψ+I(Q¯:Q)σQ¯Q =S(Q¯|Q)Ψ+S(Q¯|Q)σ
2μlogdQ¯+(1+μ)h(μ1+μ),

so that

2logdQ¯2μlogdQ¯+(1+μ)h(μ1+μ)I(Q¯:Q)σ.

We have that σ is not a tensor product whenever the left hand side of the equation above is strictly positive. For dQ=2, this occurs for ϵ1>ϵ10.08, and ϵ1 approaches 1 as dQ.

Next, we define what we call a structure function for a protocol. The structure function is computed from the mid-protocol density matrix ρQ¯MM, and (as we will see) captures the zeros in f(x,y).

Definition 6.

Given an f-routing protocol with mid-protocol density matrix ρQ¯MM, define the structure function g(x,y) according to

g(x,y)=tr(ρQ¯MdQ¯ρM)2.

We claim that g(x,y) captures some aspect of the structure in the function f which must be present in a correct f-routing protocol. More concretely we have the following.

Lemma 7.

In a perfectly correct f-routing protocol, the structure function g(x,y) is zero if and only if f(x,y)=0.

Proof.

This follows because g(x,y)=0 is zero if and only if ρQ¯M=dQ¯ρM, and Lemma 5 shows we have this tensor product form if and only if f(x,y)=0.

Our next job is to relate the function g(x,y) to the entanglement available to Alice and Bob. We prove the following lemma.

Lemma 8.

An f-routing protocol that uses a resource system with Schmidt rank dE has a structure function of the form

g(x,y)=I=1dE4fI(x)fI(y).
Proof.

From the general form of a non-local quantum computation protocol, the density matrix ρQ¯M0M1(x,y) can be expressed as

ρQ¯M0M1=𝒩QLM0xQ¯M1y(ΨQ¯Q+|ΨΨ|LR).

We will write |ΨLR in the Schmidt basis,

|ΨLR=i=1dE|iL|iR,

with un-normalized vectors |iL,|iR. Then we get

ρQ¯M0M1 =i,j=1dE𝒩QLM0x(ΨQQ¯+|ij|L)RM1y(|ij|R)
=i,j=1dEAQ¯M0x,i,jBM1y,i,j.

We can also compute the trace over Q¯ where we define A and B in the second line of the previous equation and get

ρM0M1 =i,j=1dEAM0x,i,jBM1y,i,j.

Next, we compute g(x,y). It is convenient to make use of 2 to write

g(x,y)=tr(ρQ¯M2dQ¯2ρM2).

Inserting the forms of ρQ¯M and ρM into this, we obtain

g(x,y) =i,j,i,j=1dEtr((AQM0x,i,jAQM0x,i,jdQ2AM0x,i,jAM0x,i,j)BM1y,i,jBM1y,i,j)
=I=1dE4fI(x)fI(y),

as needed.

We can view g(x,y) as a matrix, and fI(x), fI(y) as vectors so that the minimal number of terms appearing in this sum is the rank of the matrix g(x,y). Thus we obtain the lower bound

FR0(f)14logrankg|f. (2)

We know that g is zero and non-zero for the same inputs as f, for which we have given the g|f notation as a reminder. In some cases, this is enough to let us lower bound the rank of g, as we discuss below.

We can also notice that we can reverse the role of M and M, and assume perfect correctness on 1 instances, leading to a similar bound,

FR1(f)14logrankg|¬f, (3)

where ¬f is the negation of f.

We can also rephrase the above bounds in terms of the non-deterministic quantum communication complexity. Observe that

rankg|fnrank(f). (4)

Because the non-deterministic rank considers matrices with arbitrary complex values where f(x,y)=1, while g|f has the further constraint that it has positive real values when f(x,y)=1, it is possible there are functions for which rankg|f>nrank(f). We have not looked for such examples.

Using Equation 4 and Theorem 3, we obtain

FR0(f) 14(QNPcc(f)1),
FR1(f) 14(coQNPcc(f)1).

Further, for f-routing which has two sided perfection, we have

pFR(f)14max{QNPcc(f),coQNPcc(f)}1.

Or, labelling the set of function families which can be f-routed on with polylogarithmic entanglement by pFR, we have

pFRQNPcccoQNPcc.

In the classical setting, NPcccoNPcc=Pcc [8], but (to our knowledge) it is not known if the quantum analogue holds.

3.2 𝒇-BB84 bounds

Definition 9.

A qubit 𝐟-BB84 task is defined by a choice of Boolean function f:{0,1}2n{0,1}, and a 2 dimensional Hilbert space Q. Inputs x{0,1}n and system Q are given to Alice, and input y{0,1}n is given to Bob. The Q system is in the maximally entangled state with a reference Q¯. Alice and Bob exchange one round of communication, with the combined systems received or kept by Bob labelled M and the systems received or kept by Alice labelled M. Define projectors

Πq,b=Hq|bb|Hq.

The qubit f-BB84 task is completed ϵ-correctly on input (x,y) if there exist POVM’s {ΛMx,y,0,ΛMx,y,1}, {ΛMx,y,0,ΛMx,y,1} such that,

tr(ΠQ¯f(x,y),bΛMx,y,bΛMx,y,bρQ¯MM)1ϵ.

That is, Alice and Bob succeed when they both obtain the same outcome as the referee.

We will focus here on perfectly correct f-BB84, where ϵ=0.

As in the analysis of f-routing, we look for a function of the density matrix prepared by the protocol which captures the structure of the function f(x,y). We define this next.

Definition 10.

Given a f-BB84 protocol with mid-protocol density matrix ρQ¯MM, define the structure function by first defining the density matrices

ρM0 =0|Q¯ρQ¯M|0Q¯,
ρM1 =1|Q¯ρQ¯M|1Q¯.

These are the post measurement states on M when the referee measures R in the computational basis, and finds outcome b=0,1. We similarly define ρM0 and ρM1. Then define

g(x,y)=tr(ρM0ρM1)+tr(ρM0ρM1).

We show this has the same zeros as f(x,y) next.

Lemma 11.

In a perfectly correct f-BB84 protocol, the structure function g(x,y) is zero if and only if f(x,y) is zero.

Proof.

We first establish the following fact: g(x,y)=0 if and only if both ρM0 and ρM1 have non-overlapping support and ρM0 and ρM1 have non-overlapping support. To see this, first assume g(x,y)=0. Then diagonalize ρM0 and ρM1 so that

ρM0 =iλi|ψiψi|,
ρM1 =jμj|ϕjϕj|,

with λi,μj>0 and we have from g(x,y)=0 that tr(ρM0ρM1)=0, so that

0=tr(ρM0ρM1)=i,jλiμj|ϕj|ψi|2.

But this occurs if and only if

i,j,ϕj|ψi=0,

so that ρM0 and ρM1 have non-overlapping support, as needed. We can similarly conclude ρM0 and ρM1 have non-overlapping support. For the converse, a direct calculation shows both tr(ρM0ρM1) and tr(ρM0ρM1) are 0.

Now we use this fact to relate g(x,y)=0 and f(x,y)=0. First, suppose that f(x,y)=0. Then, the referee measures in the computational basis and so after the referee’s measurement, Alice holds either ρM0 or ρM1 depending on the referee’s measurement outcome. By assumption she can determine the measurement outcome perfectly, so she must be able to distinguish ρM0 and ρM1 perfectly. Thus ρM0 and ρM1 have orthogonal support. Considering the same line of reasoning but now considering Bob, whose post-measurement state is ρM0 or ρM1, these density matrices too must have orthogonal support. But then from the fact above we have g(x,y)=0.

Next suppose that f(x,y)=1. Then the referee measures in the Hadamard basis, so Alice’s post-measurement state is one of

ρM±=±|Q¯ρQ¯M|±Q¯.

For Alice to be able to determine the referee’s measurement outcome, ρM+ and ρM must have orthogonal support, so that

0=tr(ρM+ρM). (5)

We claim that this implies tr(ρM0ρM1)>0. To see why, note

ρM±=12(ρM0+ρM1±0|Q¯ρQ¯M|1Q¯±1|Q¯ρQ¯M|0Q¯).

Inserting this into Equation 5, we find that

tr(ρM0ρM1)=12(tr((ρM0)2)+tr((ρM1)2))>0.

Again, repeating the argument considering Bob’s post-measurement state and his ability to determine the referee’s measurement outcome, we also find that

tr(ρM0ρM1)>0.

Thus, g(x,y)>0 as needed.

Lemma 12.

An f-BB84 protocol that uses a resource system with Schmidt rank dE has a structure function of the form

g(x,y)=I=12dE4fI(x)fI(y).
Proof.

From the general form of a non-local quantum computation protocol, the density matrix ρQ¯M0M1(x,y) can be expressed as

ρQ¯M0M1=𝒩QLM0xRM1y(ΨQ¯Q|ΨΨ|LR).

We will write |ΨLR in the Schmidt basis,

|ΨLR=i=1dE|iL|iR,

with un-normalized vectors |iL,|iR. Then we get

ρQ¯M0M1 =i,j=1dE𝒩QLM0x(ΨQ¯Q+|ij|L)RM1y(|ij|R)
=i,j=1dEAQ¯M0x,i,jBM1y,i,j.

We can also project Q¯ into |bQ¯, b{0,1} to get ρMi,

ρM0M1b =i,j=1dEAM0b,x,i,jBM1y,i,j.

A similar calculation gives ρMb. Inserting these expressions into g(x,y), we obtain an expression of the form

g(x,y)=I=12dE4fI(x)fI(y).

where the dE4 appears because each of the two trace terms in g(x,y) comes with a product of two density matrices, each of which involves two sums running from 1 to dE. We collect all of these sums into the index i appearing here, which now runs 1 to 2dE4.

Similarly to the case of f-routing, the above lemma implies that

FBB84(f)14(logrankg|f1). (6)

where the notation g|f indicates as before that g is zero and non-zero on the same inputs as f(x,y).

Also similarly to the case of f-routing, we can use Equation 4 and Theorem 3, we obtain

FBB84(f)14(QNPcc(f)2).

4 A new lower bound technique for CDS

It was recently understood [2] that f-routing is closely related to a classical information theoretic primitive known as conditional disclosure of secrets. As a consequence, our new lower bounds on f-routing imply lower bounds on CDS. In this work, we will informally describe these lower bounds, but see [7] for a more complete treatment.

The conditional disclosure of secrets primitive involves three parties, Alice, Bob, and the referee. Alice receives input x{0,1}n, and Bob receives y{0,1}n. Alice additionally holds a secret string z, and Alice and Bob share a random string r. Alice and Bob do not communicate, but each sends a message to the referee. The goal is for the referee to be able to learn z if and only if a function f(x,y)=1, where the choice of the function f is known to all parties, and the referee knows both inputs x and y.

The quantum generalization of CDS, conditional disclosure of quantum secrets or CDQS, was recently defined [2]. In the quantum setting, Alice and Bob share a quantum state (rather than a random string) and can send quantum messages to the referee. The secret can now also be taken to be a quantum system Q rather than a classical string. The security and privacy conditions are similar to the classical case: correctness means that the referee can invert the map on Q applied by Alice and Bob when f(x,y)=1, and security means the map applied by Alice and Bob is close to completely depolarizing when f(x,y)=0. In general, we allow small correctness and privacy errors. See [2] for a formal definition.

We define the minimal number of qubits in Alice and Bob’s shared resource system in a CDQS scheme for function f by CDQS(f). If we require the protocol to be perfectly correct we write pcCDQS(f), and when perfectly private we write ppCDQS(f). Similarly, for classical CDS, we use CDS(f) to denote the randomness cost of classical CDS. Again we modify this to pcCDS(f), ppCDS(f) for perfectly correct and perfectly private CDS randomness cost.555The reader should be warned that the same notation is used to denote the communication cost in other papers on CDS.

In [2], it was shown that a good classical CDS protocol for a function f implies a good quantum CDS protocol for the same function. This leads to666In fact, to obtain this we also need an amplification result which appears in [7]. These bounds are proved formally there.

CDS(f)=Ω(CDQS(f)),

and the same relationships hold for the perfectly correct and perfectly private variants. Also in [2], it was shown that a good CDQS leads to a good f-routing protocol, and vice versa. This leads to

CDQS(f)=Θ(FR(f)),

Also, the perfectly private and perfectly correct variants are related to f-routing with one-sided errors,

ppCDQS(f)=Θ(FR0(f)),
pcCDQS(f)=Θ(FR1(f)).

This implies our lower bounds from Equation 2 and Equation 3 apply to CDS,

ppCDQS(f)=Ω(logrank(g|f)),
pcCDQS(f)=Ω(logrank(g|¬f)).

This also gives lower bounds in terms of QNPcc(f) and coQNPcc(f), and the upper bound can be written in terms of classical CDS. In this way, we can obtain the lower bound

pcCDS(f)Ω(coQNPcc(f)).

This is similar to a lower bound obtained in [5],

pcCDS(f)12coNPcc(f).

The lower bound on perfectly private CDS randomness cost seems to be new,

ppCDS(f)Ω(QNPcc(f)).

For perfect CDS, we can bound the randomness cost by the maximum of the QNPcc and coNPcc cost. If we let pCDS denote the set of families of functions for which CDS can be implemented with perfect correctness and perfect privacy using polylogarithmic randomness. Then we obtain

pCDSQNPcccoNPcc.

5 Application to concrete functions

We detail lower bounds for equality, non-equality, greater than and less than, set-disjointness, and set-intersection below. We were not able to use our technique to lower bound inner product.

Our results are summarized succinctly in Figure 3.

Function pFR FR1 FR0 FR
Equality Θ(n) Θ(1) Θ(n) Θ(1)
Non-Equality Θ(n) Θ(n) Θ(1) Θ(1)
Inner-Product O(n), Ω(1) O(n), Ω(1) O(n), Ω(1) O(n), Ω(1)
Greater-Than Θ(n) Θ(n) Θ(n) O(n), Ω(1)
Set-Intersection Θ(n) Θ(n) O(n),Ω(1) O(n), Ω(1)
Set-Disjointness Θ(n) O(n),Ω(1) Θ(n) O(n), Ω(1)
Figure 3: Known upper and lower bounds on entanglement cost (quantified by the log Schmidt rank) in f-routing for natural functions. No non-trivial lower bounds on entanglement were known prior to this work. Linear upper bounds on all of these functions follow from [12, 13]. The Ω(1) lower bounds follow from Appendix A.

Equality and non-equality

Choose f(x,y) to be the equality function,

EQ(x,y)={0,xy1,x=y.

Then g(x,y) is zero except on the diagonal, which forces it to have full rank, so from Equation 2 and Equation 6

FR0(EQ)n4,pFBB84(EQ)14(n1).

For the not-equals function, we can use bound from Equation 3 to obtain

FR1(NEQ)n4.

Greater and less than

Similarly, the “greater than” function,

GT(x,y)={0,x<y1,xy.

is upper triangular with non-zero elements on the diagonal, so it also has full rank, and we obtain a linear lower bound.

FR0(GT)n4,pFBB84(GT)14(n1).

Further, because the negation of Greater-Than is also full rank, we can also bound fR1,

FR1(GT)n4.

The same bounds hold for the “less than” function.

Set-Intersection and set-disjointness

Set disjointness is upper left triangular.777To see why, consider that on the diagonal of the truth table running top right to bottom left, we have that x+y=1111, the all 1’s string. This means x and y must have non-zero values in non-overlapping locations, e.g. for two bits this diagonal consists of (x=00,y=11), (x=01,y=10), (x=10,y=01) and (x=11,y=00). Moving downward from any entry on that diagonal y becomes larger, so must now have an overlapping entry with the x string. This implies it is full rank, therefore

FR0(DISJ)n4,pFBB84(DISJ)14(n1).

Since the negation of set intersection is set disjointness and hence of full rank, we also obtain

FR1(INT)n4.

6 Discussion

In this article, we have given the first non-trivial lower bounds on entanglement in the f-routing and f-BB84 tasks. For some natural functions, including equality, greater than, and set-disjointness, our lower bounds are linear in the classical input size. This realizes a long standing aspiration for f-routing and f-BB84 based position-verification schemes: that an honest party can compute a simple, classical function and perform O(1) quantum operations, while a dishonest party must use entanglement that grows with the size of the classical input strings. However, this result comes at the unfortunate cost of requiring perfect correctness for the lower bounds to apply. Nonetheless, even proving bounds in this perfect case has so far been elusive, and we hope that our progress may open future avenues toward robust linear lower bounds.

An interesting observation is that our bounds lead to relations among operational quantities, e.g.

FR0(f)QNPcc(f)

but are derived by separately relating FR0 and QNPcc to the non-deterministic rank. Given this result, it would be natural to expect a reduction at an operational level from f-routing to quantum non-deterministic communication complexity, but we know of no such reduction.

As a consequence of our lower bounds, we also obtain a new lower bound technique for randomness complexity in CDS with either perfect privacy or perfect correctness. We highlight the bound

ppCDS(f)Ω(QNPcc(f)).

which appears to be new and incomparable to earlier bounds on ppCDS. It would be interesting to construct explicit functions for which this lower bound is tighter than earlier ones, for instance, bounds from the PPcc cost of f [4].

References

  • [1] Rene Allerstorfer, Andreas Bluhm, Harry Buhrman, Matthias Christandl, Llorenç Escolà-Farràs, Florian Speelman, and Philip Verduyn Lunel. Making existing quantum position verification protocols secure against arbitrary transmission loss. arXiv preprint, 2023. arXiv:2312.12614.
  • [2] Rene Allerstorfer, Harry Buhrman, Alex May, Florian Speelman, and Philip Verduyn Lunel. Relating non-local quantum computation to information theoretic cryptography. arXiv preprint, 2023. arXiv:2306.16462.
  • [3] Harriet Apel, Toby Cubitt, Patrick Hayden, Tamara Kohler, and David Pérez-García. Security of position-based quantum cryptography limits hamiltonian simulation via holography. arXiv preprint, 2024. arXiv:2401.09058.
  • [4] Benny Applebaum and Barak Arkis. On the power of amortization in secret sharing: d-uniform secret sharing and cds with constant information rate. ACM Transactions on Computation Theory (TOCT), 2020. doi:10.1145/3417756.
  • [5] Benny Applebaum and Prashant Nalini Vasudevan. Placing conditional disclosure of secrets in the communication complexity universe. Journal of Cryptology, 2021. doi:10.1007/s00145-021-09376-1.
  • [6] Vahid R. Asadi, Richard Cleve, Eric Culf, and Alex May. Linear gate bounds against natural functions for position-verification. arXiv preprint, 2024. arXiv:2402.18648.
  • [7] Vahid R Asadi, Kohdai Kuroiwa, Debbie Leung, Alex May, Sabrina Pasterski, and Chris Waddell. Conditional disclosure of secrets with quantum resources. arXiv preprint, 2024. arXiv:2404.14491.
  • [8] László Babai, Peter Frankl, and Janos Simon. Complexity classes in communication complexity theory. In 27th Annual Symposium on Foundations of Computer Science (SFCS 1986). IEEE, 1986. doi:10.1109/SFCS.1986.15.
  • [9] Salman Beigi and Robert König. Simplified instantaneous non-local quantum computation with applications to position-based cryptography. New Journal of Physics, 2011. doi:10.1088/1367-2630/13/9/093036.
  • [10] Andreas Bluhm, Matthias Christandl, and Florian Speelman. A single-qubit position verification protocol that is secure against multi-qubit attacks. Nature Physics, 2022. doi:10.1038/s41567-022-01577-0.
  • [11] Harry Buhrman, Nishanth Chandran, Serge Fehr, Ran Gelles, Vipul Goyal, Rafail Ostrovsky, and Christian Schaffner. Position-based quantum cryptography: Impossibility and constructions. SIAM Journal on Computing, 2014. doi:10.1137/130913687.
  • [12] Harry Buhrman, Serge Fehr, Christian Schaffner, and Florian Speelman. The garden-hose model. In Proceedings of the 4th conference on Innovations in Theoretical Computer Science, 2013. doi:10.1145/2422436.2422455.
  • [13] Joy Cree and Alex May. Code-routing: a new attack on position verification. Quantum, 2023. doi:10.22331/q-2023-08-09-1079.
  • [14] Ronald de Wolf. Characterization of non-deterministic quantum query and quantum communication complexity. In Proceedings of the 15th Annual IEEE Conference on Computational Complexity, 2000. doi:10.1109/CCC.2000.856758.
  • [15] Ronald De Wolf. Nondeterministic quantum query and communication complexities. SIAM Journal on Computing, 2003. doi:10.1137/S0097539702407345.
  • [16] Llorenç Escolà-Farràs, Léo Colisson Palais, and Florian Speelman. A quantum cloning game with applications to quantum position verification. arXiv preprint, 2024. arXiv:2410.22157.
  • [17] Yael Gertner, Yuval Ishai, Eyal Kushilevitz, and Tal Malkin. Protecting data privacy in private information retrieval schemes. Journal of Computer and System Sciences, 2000. doi:10.1006/jcss.1999.1689.
  • [18] Adrian Kent, William J Munro, and Timothy P Spiller. Quantum tagging: Authenticating location via quantum information and relativistic signaling constraints. Physical Review A, 2011. doi:10.1103/PhysRevA.84.012326.
  • [19] Adrian P Kent, William J Munro, Timothy P Spiller, and Raymond G Beausoleil. Tagging systems, 2006. US Patent 7,075,438.
  • [20] Robert Malaney. The quantum car. IEEE Wireless Communications Letters, 2016. doi:10.1109/LWC.2016.2607740.
  • [21] Alex May. Quantum tasks in holography. Journal of High Energy Physics, 2019. doi:10.1007/JHEP10(2019)233.
  • [22] Alex May. Holographic quantum tasks with input and output regions. Journal of High Energy Physics, 2021. doi:10.1007/JHEP08(2021)055.
  • [23] Alex May. Complexity and entanglement in non-local computation and holography. Quantum, 2022. doi:10.22331/q-2022-11-28-864.
  • [24] Alex May, Geoff Penington, and Jonathan Sorce. Holographic scattering requires a connected entanglement wedge. Journal of High Energy Physics, 2020. doi:10.1007/JHEP08(2020)132.
  • [25] Marco Tomamichel, Serge Fehr, Jędrzej Kaniewski, and Stephanie Wehner. A monogamy-of-entanglement game with applications to device-independent quantum cryptography. New Journal of Physics, 2013. doi:10.1088/1367-2630/15/10/103002.
  • [26] Andreas Winter. Tight uniform continuity bounds for quantum entropies: conditional entropy, relative entropy distance and energy constraints. Communications in Mathematical Physics, 2016. doi:10.1007/s00220-016-2609-8.

Appendix A 𝛀(𝟏) lower bounds on entanglement in 𝒇-routing

It is straightforward to establish an Ω(1) lower bound on entanglement for f-routing, though to our knowledge this lower bound is not recorded elsewhere in the literature, so we give it here. Note that for f-BB84 a Ω(1) lower bound follows from theorem 6.1 in [11].

To show the lower bound in the f-routing setting, we will first notice that in a f-routing task we can always replace a mixed resource state ΨLR with a pure state |ΨLR. Our lower bound will apply whenever f(x,y) has an input x=x0 such that f(x0,y)=F(y) is non-constant. We will assume perfect correctness of the f-routing protocol in our arguments but the generalization to the robust setting is immediate.

Considering the perfect protocol, we allow Alice and Bob to complete the easier task of performing f-routing when they know x=x0. Alice, on the left, applies a quantum channel 𝒩QLAB, she keeps system A and sends B to Bob. Without decreasing their success probability we can take the isometric extension of this channel and have Alice keep the purifying system so that the state on ABR is pure. Bob, who knows y, knows where system Q should be brought so can, without decreasing their success probability, always simply forward the R system to whichever party should receive Q. Correctness of the protocol then requires that both AR and BR can recover Q.

Let Q be in the maximally entangled state ΨQ¯Q+ with reference system Q¯. Then correctness of the protocol implies that

I(Q¯:AR)=2logdR,
I(Q¯:BR)=2logdR. (7)

We claim this implies that S(R)logdR. First notice that purity of Q¯ABR and the second line above implies I(Q¯:A)=0. Then we apply the inequality,

I(Q¯:AR)I(Q¯:A)+2S(R),

which can be proven from strong subadditivity, and using the first line of Appendix A we are done. In the robust setting, we can prove a similar bound by applying the above argument along with the continuity of the von Neumann entropy.