Abstract 1 Introduction 2 Preliminaries 3 Estimating Inner Product 4 Generalized Distributed Inner Product Estimation References

Generalized Inner Product Estimation with Limited Quantum Communication

Srinivasan Arunachalam ORCID IBM Quantum, Almaden, CA, USA Louis Schatzki ORCID Electrical and Computer Engineering, University of Illinois Urbana-Champaign, IL, USA
Abstract

In this work, we consider the fundamental task of distributed inner product estimation when allowed limited communication. Suppose Alice and Bob are given k copies of an unknown n-qubit quantum state |ψ,|ϕ respectively, are allowed to send q qubits to one another, and the task is to estimate |ψ|ϕ|2 up to constant additive error. We show that k=Θ(2nq) copies are essentially necessary and sufficient for this task (extending the work of Anshu, Landau and Liu (STOC’22) who considered the case when q=0). Additionally, we also consider the task when the goal of the players is to estimate |ψ|M|ϕ|2, for arbitrary Hermitian M. For this task we show that certain norms on M determine the sample complexity of estimating |ψ|M|ϕ|2 when using only classical communication.

Keywords and phrases:
Quantum property testing, Quantum Distributed Algorithms
Copyright and License:
[Uncaptioned image] © Srinivasan Arunachalam and Louis Schatzki; licensed under Creative Commons License CC-BY 4.0
2012 ACM Subject Classification:
Theory of computation Quantum information theory
Related Version:
Full Version: https://arxiv.org/pdf/2410.12684 [4]
Funding:
We acknowledge support from IBM through the Illinois-IBM Discovery Accelerator Institute.
Editors:
Olaf Beyersdorff, Michał Pilipczuk, Elaine Pimentel, and Nguyễn Kim Thắng

1 Introduction

The construction of quantum networks is a major goal in quantum information science [22, 27, 24, 15]. These networks are envisioned to consist of disjoint quantum processing nodes with quantum communication interlinks, likely implemented through photonics. While the nodes may consist of the same type of qubit, this is not a requirement, and work has gone into designing heterogeneous networks where the nodes have different physical compositions [19]. With this in mind it is of interest to develop distributed protocols in a platform-independent framework.

In this paper we consider a natural distributed variant of the inner product estimation problem: suppose there are two spatially separated parties Alice and Bob who are each given copies of an unknown d-dimensional quantum state |ψ and |ϕ respectively and their goal is to compute |ψ|M|ϕ|2 for some Hermitian operator M. We will be interested in the difficulty of this task depending on how much entanglement Alice and Bob share. The core motivation for our setup is that distributing entanglement between nodes in a network is not a free resource and adds time and difficulty to a protocol. Thus, it is useful to minimize the amount of entanglement required. Similar concerns arise in various papers on distributed quantum computing [28, 18, 1].

We call this the generalized distributed inner product estimation problem (GIPE). The setting of M=𝕀 in GIPE (which we refer to as distributed inner product estimation DIPE) is one of the important steps in cross-platform verification proposed in [16] where the goal is to test if two quantum computers (say built on different platforms) are preparing the same quantum state; a fundamental problem for near-term devices. A natural constraint in these papers is how the quantum computers communicate with one another and in these works they consider either only classical communication or limited quantum communication (the latter being the focus of our work). Apart from verification, on a theoretical level, understanding the complexity of a question, as fundamental as inner product estimation, in a distributed manner is a natural question.

The seminal work of Buhrman, Cleve, Watrous and Wolf [9] on quantum fingerprinting introduced the so-called swap test. This subroutine takes as input one copy of unknown quantum states |ψ and |ϕ and outputs a bit whose bias equals |ψ|ϕ|2; allowing us to estimate the inner product between two unknown quantum states without knowing anything about the states themselves. This subroutine has found applications in several areas in quantum computing from complexity theory, learning theory, entanglement theory, to optimization. Although so widely used, there still remain some open fundamental questions about estimating inner products, which is the topic of this work.

There are two techniques to solve GIPE under different settings: (i) If allowed quantum communication, then Alice can send a few copies of the d-dimensional quantum state over to Bob, then Bob could perform a variant of the swap test to estimate |ψ|M|ϕ|2; (ii) if allowed only classical communication, i.e., Alice and Bob only send classical messages, then a recent work of Anshu et al. [3] showed that Θ(d) copies of |ψ,|ϕ are necessary and sufficient in order to estimate |ψ|ϕ|2. This setting is often referred to as local operations and classical communication (𝖫𝖮𝖢𝖢) and has received a lot of attention in quantum information theory [13, 7, 17]. Although (ii) is surprising in that, the sample complexity is quadratically better than full-state tomography, the exponential (since we typically work with d=2n, where n is the number of qubits) nature of the complexity seems rather large in practice. Their work raises two natural questions, which will be the focus here:

  1. 1.

    With the advent of near-term quantum devices, sending the full-quantum state (as in the protocol (i) above) might be hard, but it is plausible that one could send a few qubits of quantum message. If this were possible, then what is the complexity of DIPE when allowed q-qubit messages?

  2. 2.

    The work of Anshu et al. [3] showed how to solve GIPE when M=𝕀, but other natural properties of quantum states are captured by letting M be an arbitrary operator, for example, predicting few-body properties, such as two-point correlation functions, entanglement entropy of small subsystems, expectation values of observables, projector onto a subspace or perhaps a Pauli string, then M may be different than 𝕀. In this case, understanding the complexity of GIPE for arbitrary M is relevant.

These questions were explicitly raised by Anshu et al. [3] (and as open question 21 in [2]) and in this work we answer both.

1.1 Results

Our first result considers the setup where Alice and Bob may communicate a few qubits in an interactive protocol but not necessarily enough to teleport copies of their states. For simplicity assume that Alice and Bob each have n-qubit states and can transmit in total q qubits of communication. As we mentioned above, the sample complexity when q=0 was shown to be 2n by [3] and when q=n, the sample complexity is O(1). Is there some saving in sample complexity when allowed q qubits of communication? Our first result shows a smooth interpolation between both these settings.

Theorem 1 (Informal).

Suppose Alice and Bob are given k copies of n-qubit states |ψ and |ϕ respectively can communication Θ(q) qubits along with performing 𝖫𝖮𝖢𝖢. Then it is necessary and sufficient for them to obtain

k=Θ(2(nq)/2),

copies of their states to estimate |ϕ|ψ|2 up to constant accuracy with high probability.111We will state the constants in this theorem more clearly when proving this theorem.

The upper bound k=𝒪(2(nq)/2) shows that quantum communication may help. However, to reach sub-exponential scaling, a large amount of quantum communication is necessary i.e., unless q=npolylog(n), our lower bound is still exponential in n. Informally, entanglement helps, but not too much.

Our next result concerns the sample complexity, under 𝖫𝖮𝖢𝖢, of GIPE, i.e., for arbitrary Hermitian operators M. A natural possibility when estimating |ψ|M|ϕ|2 is that, perhaps Alice and Bob only need to confirm that their states have a large overlap in one of several smaller subspaces “within M”. Then, it is conceivable that this task would be much easier than full inner product estimation (i.e., when M=𝕀). We show that this is indeed the case! Let Mε be M restricted to subspaces with eigenvalue of magnitude at least ε/2. We prove the following near-optimal results for general GIPE.

Theorem 2 (Informal).

For every M with M1 and ε>0, to estimate |ϕ|M|ψ|2 to error ε, it is sufficient to obtain

k=𝒪(max{1/ε2,Mε2/ε})

copies of |ψ,|ϕ and

k=Ω(max{1/ε2,Mε2/ε})

copies are necessary.

Interestingly, this implies that M having both positive and negative eigenvalues may not render estimation harder than definite operators. Take Pauli strings as an example, an important set of operators in quantum information. These have eigenspaces of eigenvalues ±1 each of dimension 2n1. Then, in evaluating |ϕ|M|ψ|2 there may be cancellations between components of the states lying in eigenspaces of different signs. However, our results show that estimating such an M is no harder than estimating 𝕀, which is positive definite and basis independent. While our upper and lower bounds do not exactly match, this is partially due to choice of presentation. The lower bound we prove is actually Ω(Mε1/εdε), where dε is the dimension of the support of Mε. Converting 1 to 2 norm yields the lower bound as presented above. However, in some cases this more precise bound is tight. Take, for example, M a projector onto a subspace or a Pauli string. Then, we obtain the lower bound Ω(Mε2/ε), exactly matching the upper bound.

Proof sketch.

In [3], they prove their lower bound using a very interesting connection to quantum cloning: in particular, they show that if one could solve a decision-version of DIPE, then one could have cloned the states “well-enough”. One of the main challenges in proving our lower bound was that the cloning-based lower bounds do not work when allowed even few qubits of communication in the cloning channel (which is the setting in which we would like lower bounds). Instead, here we showed that one could use the notion of robustness of entanglement, a concept from entanglement theory and split a protocol with a quantum channel into a sum of LOCC protocols. Proving this is a small technical lemma which we combine with the lower bound of [3] to obtain our overall lower bound of 2nq. In order to prove our upper bound, we use ideas from the celebrated Johnson-Lindenstrauss lemma. Our main idea is to perform projections onto random subspaces, i.e., Alice and Bob pick random subspaces and project their states onto these subspaces, maintaining the inner product between their states with high probability. Further, this protocol is completely agnostic to the states they started with. Now holding smaller-dimensional projections of their states, they can use classical communication to detect when their subspace-projections have collisions, use their shared quantum channel and perform SWAP tests to estimate the inner product within the subspace. With some analysis, we are able to show that the overall sample complexity for this scales as 2nq as well, matching our lower bound.

For estimating bilinear forms, our protocol is fairly similar to the one in [3] except that we need to deal with some technicalities due to the Hermitian operator M. The key observation we first make is that |ϕ|M|ψ|2 and |ϕ|Mε|ψ|2 can only differ by at most ε/2. So it suffices for Alice and Bob to restrict themselves to the support of Mε. Then, they can simultaneously measure the magnitude of the components of their states in this subspace as well as the weighted inner product of said components. The calculations here are similar to the one in [3] wherein one needs to compute the mean variance of the estimator, but a little bit more technical in order to bound all the terms in terms of Mε2. The lower bound follows from realizing that Mε when restricted to its support, is not too far off from identity and then we can invoke the lower bounds for inner product estimation can be applied. We remark that the lower bound here is much more subtle than the one in [3] since one needs to project onto the eigenspaces of M carefully in order to get the optimal dependence on Mε2.

1.2 Related works and open questions

Like we mentioned earlier, our work answers two open questions raised by Anshu et al. [3]. There have been a few more papers since their work: Hinsche et al. [21] look at specific instantiations of DIPE (when the protocol used by Alice and Bob are Pauli sampling and the quantum states are structured) and prove some positive and negative results to this end. Chen et al. [10] extend the work of [3] by proving better bounds for non-trace-preserving quantum channels, Chen et al. [11] also looked at quantum property testing in the 𝖫𝖮𝖢𝖢 model.

Distinguishability under LOCC has a rich history in the quantum information literature. Bennett, et al. demonstrated that there exist product bases which are easily distinguished, but are indistinguishable under LOCC [7]. Enough entanglement renders this task easy as the two parties can simply teleport states. Subsequent works showed that much less entanglement may suffice for this task [14, 29]. Unlike our framework, these papers concerned themselves with measurements of a single copy and further identifying states from some known ensemble, rather than learning some property.

A natural open question.

A tantalizing open question left open by [3] and also this work is the analogue of DIPE in the mixed case setting. Here the goal is as follows: Alice has copies of ρ, Bob has copies of σ and they engage in 𝖫𝖮𝖢𝖢. They need to distinguish if ρ=σ or ρσtrε, promised one of them is the case. Using the bounds obtained in [3], we have an upper bound of O(d2/ε4+d1.5/ε2). As for lower bounds, [5] showed that if Alice also had copies of σ (instead of Bob having them), then one can solve this property testing task using 𝒪(d/ε2) copies (this procedure requires a highly-entangling operation between copies of ρ and σ). Furthermore, if we restricted the measurements to be single-copy measurements and if we fix σ=𝕀/d, then Ω(d3/2) copies are necessary [12]. Despite several attempts in making progress on this question, we have not been able to obtain a lower bound better than Ω(d) and believe that the sample complexity of mixed state DIPE should be 𝒪(d). We leave this as an open question.

2 Preliminaries

2.1 Quantum States and Measurements

Pure quantum states are unit vectors in d. A qubit is a state in 2 and n-qubits is a state in (2)n2n. Mixed states, also known as density matrices, ρ, are positive semi-definite operators on d with unit trace. Pure states correspond to rank 1 mixed states and we will routinely use the notation ψ to refer to the density matrix corresponding to a pure state |ψ. Measurements of quantum systems are described by positive operator valued measures (POVMs), ensembles of positive semi-definite operators {Mi}i such that iMi=𝕀. The probability of observing an outcome i is given by 𝖳𝗋[Miρ]. By M we denote the operator norm of an operator.

In quantum computation states are manipulated via unitary evolution. That is, |ψ is mapped to U|ψ for some unitary U. An important unitary we will make repeated usage of is the SWAP gate on a bipartite state. This has the action SWAP|ψ|ϕ=|ϕ|ψ.

Operators on two Hilbert spaces A and B lie in the tensor product space (AB). A positive semi-definite operator M acting on these tensor product space is said to be separable if it admits a decomposition M=iAiBi, where each Ai and Bi are positive semi-definite. We will be interested in separable POVMs, where each aspect Mi is separable. These are measurements that cannot create entanglement between distributed parties. However, such measurements may still go beyond those achievable with classical communication. With this in mind, one can define local operations and classical communication (𝖫𝖮𝖢𝖢) [13]. This can roughly be defined as all protocols where Alice performs some measurement in her lab, communicates the result to Bob, who then performs a measurement in his lab and communicates the result to Alice and so on. However, the set of 𝖫𝖮𝖢𝖢 measurements is mathematically unwieldy and it is generally easier to prove results regarding separable measurements. An e-bit is a standard resource of entanglement in quantum information. This is a shared two qubit resource state |Φ+=12(|00+|11). With n e-bits and classical communication, two distributed parties can teleport an n qubit state [23].

2.2 Subroutines

We will make repeated reference to the SWAP test, which can be used to estimate the overlap between two states |ψ and |ϕ [6, 9].

Definition 3 (SWAP test).

Given two mixed states ρ and σ and an ancilla qubit initialized in the state |0E, the SWAP test performs the unitary (HE𝕀AB)(|00|𝕀AB+|11|SWAPAB)(HE𝕀AB) and measures the ancilla in the computation basis. The measurement probabilities are given by

p(0)=1+𝖳𝗋[ρσ]2,p(1)=1𝖳𝗋[ρσ]2.

Via standard amplification arguments, 𝒪(1/ε2) trials are sufficient to estimate 𝖳𝗋[ψϕ] to error ε. Using block-encodings, this can be extended to estimating |ϕ|M|ψ|2 for an arbitrary hermitian M such that M1. Again, standard amplification arguments show that 𝒪(1/ε2) trials suffices to estimate |ϕ|M|ψ|2. We will also use the standard POVM on the symmetric subspace. The symmetric group Sk has a natural action on the state space of (d)k given by

πi=1k|ψi =i=1k|ψπ1(i)πSk. (1)
Definition 4 (Symmetric Subspace).

The k-copy symmetric subspace of a vector space Vd, is given by

kd={|ψ(d)k|π|ψ=|ψπSk}.

The symmetric subspace has a natural spanning set given by {|ϕk||ϕd}[20]. Due to kd being an irreducible representation of the unitary group (under the action Uk), we can define a uniform POVM on the symmetric subspace, which is known as the standard POVM.

Definition 5 (Standard POVM on kd).

The standard POVM on kd is the continuous POVM with elements

{(d+k1k)|φφ|kdφ||φd}. (2)

We require one last fact about the symmetric subspace:

Fact 6 (Haar moments).

If |ψ is drawn from the Haar measure on d, then

𝔼ψ[ψ] =𝕀d,𝔼ψ[ψ2]=1d(d+1)(𝕀+SWAP). (3)

3 Estimating Inner Product

In this section we consider the following task: Alice and Bob each have copies of unknown d-dimensional states |ϕ and |ψ. They may use any amount of classical communication and some restricted quantum communication. Their goal is to estimate |ϕ|ψ|2 using as few samples of |ψ and |ϕ as possible. Here we will assume the desired measurement precision is some constant.

Theorem 7.

Suppose Alice and Bob share a q-qubit entangled state, can perform measurements on k copies of their respective d-dimensional states |ψ and |ϕ respectively and engage in unbounded classical communication. If they are able to estimate |ψ|ϕ|2 to accuracy ε with high probability, then Ω(max{1/ε2,d/q/ε}) are necessary.

Theorem 8.

Suppose Alice and Bob share a 10q-qubit entangled state, can perform measurements on k copies of their respective d-dimensional states |ψ and |ϕ respectively and engage in unbounded classical communication. It suffices to obtain k=O(d/q/ε2) copies, in order to estimate |ψ|ϕ|2 to accuracy ε with high probability.

We remark that there is a constant-factor difference in the amount of entanglement bounds in the upper and lower bound. This largely seems to stem from the sample complexity still being greater than 1 even when q=n: say that Alice is able to transmit her state exactly and Bob does the swap test. Even then, in order to compute the inner product |ψ|ϕ|2 to error 0.1, they need to repeat the swap test constantly many times. Our lower bound for this setting would imply a constant lower bound as well (matching the upper bound, but not “exactly” since it would be a constant-factor off). Regardless, our lower bound can be understood as saying that entanglement does not help for inner product estimation unless the shared entanglement dimension scales with d.

3.1 Lower bound in main theorem

To obtain a lower bound we consider the decision problem constructed in [3] (which is called the DIPE, distributed inner product estimation problem). Alice and Bob are promised to be in one of the following two scenarios. Their version restricts Alice and Bob to 𝖫𝖮𝖢𝖢 protocols. However, here we allow them to share some resource state σ as well.

Definition 9 (Distributed Inner Product Estimation, Decision Version).

Alice and Bob each have access to k copies of the states |ϕ and |ψ in d respectively and are asked to decide, using 𝖫𝖮𝖢𝖢 and perhaps a resource state σ, which of the following two scenarios they are in:

  • YES: |ϕ=|ψ and they are Haar random

  • NO: |ϕ,|ψ are Haar random.

Say that Alice and Bob are able to transmit a r dimensional quantum message. Because of quantum teleportation, this communication channel is equivalent, under 𝖫𝖮𝖢𝖢, to sharing a r-dimensional maximally entangled state. Going forward, we let σ=1ri,j=1r|iijj| be the state Alice and Bob share.

We also introduce a measure of entanglement called the robustness of entanglement.

Definition 10 (Robustness of entanglement [26]).

Any quantum state σ(AB) can be decomposed as σ=(1+s)σ+sσ, where σ+ and σ are both separable states and s0. The minimum value of s over all such decompositions is called the robustness of entanglement. We denote this minimum value by E(σ).

In particular, we will use the following lemma.

Lemma 11 ([26]).

If σ is a pure bipartite state, then the robustness of entanglement is E(σ)=(iλi)21, where {λi}i are the Schmidt coefficients.

Thus, the robustness of entanglement of σ is E(σ)=r1 (since all of its Schmidt coefficients are 1/r). In [3] they show the following result:

Theorem 12 ([3]).

Let M be a separable measurement, then

|𝔼ϕ,ψ[M𝖳𝗋[ϕk(ϕkψk)]]|ek2/d1. (4)

With this we now prove our main theorem lower bound.

Proof of lower bound of Thm 7.

Say that there exists a separable protocol 𝒜 that uses k copies of the states |ϕ and |ψ and the resource state σ and returns an estimate of |ψ|ϕ|2 to accuracy ε with probability at least 3/4. Because of anti-concentration of the Haar measure, Alice and Bob will be able to use this protocol to solve problem 9 with high probability. Let B([ϕ],ε) be the ball of radius επ/2 around [ϕ] in (d) with respect to the Fubini-Study metric, which we will denote as d([ϕ,ψ])=arccos|ψ|ϕ|. Then, it is known that, under the uniform distribution, the volume of B([ϕ],ε) for επ/2 is given by sin2d2ε [8]. If |ψ|ϕ|2>ε, then d([ψ,ϕ])arccosε (and arccosεπ/2 for ε[0,1]). Thus, for constant ε it follows that |ϕ|ψ|2ε with exponentially (in d) high probability in case two of 9. Thus, if Alice and Bob use the protocol 𝒜, they will solve problem 9 with probability at least 2/3 as well. This implies that there is some separable POVM {M,𝕀M} such that

1/3|𝔼ϕ,ψ𝖳𝗋[M(ϕk(ϕkψk)σ)]|. (5)

We now show that the RHS of the inequality above can be upper bounded by (1+2E(σ))(ek2/d1). To see this, split σ into σ=(1+E(σ))σ+E(σ)σ, where σ+ and σ are both separable states. Then, it follows that

𝖳𝗋[M(ϕk(ϕkψk)σ)]= (1+E(σ))𝖳𝗋[M(ϕk(ϕkψk)σ+]
+E(σ)𝖳𝗋[M(ϕk(ψkϕk)σ]. (6)

Note that the sign of σ has been absorbed into the trace in the second term above. Now, because σ± are separable, each term above could be replaced by a separable measurement on ϕk(ϕkψk) without any reference state. To see this, decompose σ+ into σ+=ipiρiAρiB. Using spectral decompositions ρiA=kλi,k|ui,kui,k| and ρiB=kνi,k|vi,kvi,k|, we arrive at

𝖳𝗋[M(ϕk(ϕkψk)σ+)] (7)
=ipij,kλi,kνi,j𝖳𝗋[M(ϕkψk|ui,jui,j||vi,ki,k|). (8)

As a separable measurement, we have M=tAtBt. Now define a new measurement

M:=tipi(jλi,jAti,j,j)(kνi,kBti,k,k), (9)

where At=j,jAti,j,j|ui,jui,j| and Bt=k,kBti,k,k|vi,kvi,k|. As a sum of positive operators, this is positive. As a convex combination of operators majorized by 𝕀, this is also majorized by 𝕀. It then follows that M is a separable POVM. From Thm 12 it then follows that

|𝔼ϕ,ψ[𝖳𝗋[M(ϕk(ϕkψk)σ+)]]| =|𝔼ϕ,ψ[𝖳𝗋[M(ϕk(ϕkψk)]]|
ek2/d1. (10)

The same proof shows that

|𝔼ϕ,ψ[𝖳𝗋[M(ϕk(ψkϕk)σ)]]| ek2/d1. (11)

Thus, we have that

|𝔼ϕ,ψ[𝖳𝗋[M(ϕk(ϕkψk)σ)]]| (1+2E(σ))(ek2/d1). (12)

Putting the above along with our lower bound in Eq.(5) shows

1/3|𝔼ϕ,ψ𝖳𝗋[M(ϕk(ϕkψk)σ)]|.(1+2E(σ))(ek2/d1). (13)

Rearranging, this implies that

k=Ω(dlogE(σ)). (14)

So, if Alice and Bob share q Bell pairs, then E(σ)=2q1 and we get the desired lower bound.

Using techniques similar to [3, Section 5.3], wherein they showed how to use standard concentration techniques to reduce the decision version of DIPE (for which we have a Ω(d/q) lower bound) to prove a lower bound for estimating the inner product between |ϕ and |ψ with a factor of 1/ε. In particular, they prove that if there exists a protocol that solves the ε-version of inner product estimation then it can be used to solve DIPE with high probability. Then, the lower bound on DIPE follows from their reduction.

3.2 Upper bound in main theorem

We now give a protocol which achieves the promised sample complexity of Thm 8. At a high level, the protocol works by randomly projecting |ϕ and |ψ into small-dimensional subspaces. Since such a projection maintains the inner product between two states with high probability, Alice can simply send Bob these smaller dimensional states and Bob can perform a swap test. The reader may notice that this assumes that Alice can transmit an arbitrary state in a q-dimensional subspace of a d-dimensional space. This, however, does not lead to any issues since Alice knows the subspace the state lies in. Then, any maximally entangled state on a q-dimensional subspace can be converted to a maximally entangled state on the desired subspace via a unitary transformation. From there, Alice and Bob simply perform a teleportation protocol.

Theorem 13.

Let q=Ω(logd). Using k=𝒪(d/q) copies of |ψ and |ϕ, there is a protocol that uses Θ(1) r-dimensional quantum messages, single copy measurements, and returns |ψ|ϕ|2 up to constant error with high probability

Proof.

Let ψ=|ψψ| and ϕ=|ϕϕ|. Fix some unitary U. For convenience of notation we will assume that r divides d (working with qubits, if Alice and Bob may communicate log(r) qubits then this holds). Divide the d-dimensional Hilbert space into d/r subspaces each of dimension r. Let this decomposition be given by a collection of orthogonal projectors {Pi}i=1d/r. Alice and Bob perform the protocol in Figure 1.

Input: Alice gets |ψk, Bob gets |ϕk

Output: ε-approximation of |ψ|ϕ|2

  1. 1.

    Using shared randomness, Alice and Bob sample a unitary U from Haar measure.

  2. 2.

    Alice and Bob apply the POVM {UPiU}i=1d/r on each of the k copies and record which copies were projected onto which subspaces.

  3. 3.

    Using a two-way classical communication they determine which copies lie now in the same subspaces. Alice sends Bob a constant number of such projected states which can be paired with a post-projection state of Bob’s. Say the number of such pairs is m.

  4. 4.

    Bob performs a 𝖲𝖶𝖠𝖯 test between the post-projected pairs of states lying in the same subspaces. We say a 𝖲𝖶𝖠𝖯 test succeeds if Bob measures |0 on the ancilla register. Let the number of successes be s.

  5. 5.

    Bob declares the inner product between |ψ and |ϕ to be 2s/m1.

Figure 1: Protocol to estimate inner product using shared entanglement.

Our theorem will follow by repeating the protocol above constantly many times, each time by sending a r-dimensional quantum message. To see the correctness, we will require the following fact.

Fact 14 ([25, Fact 2]).

Let 1qd. Let vd be a unit vector and Pi be an arbitrary projector onto a r-dimensional subspace. Let U be drawn from the unitary Haar measure. Then,

PrU[PiUv2(1±Δ)rd]4exp{Δ2r16}, (15)

By linearity this extends to arbitrary vectors in d, as the following corollary demonstrates.

Corollary 15.

Let 1rd. Let ud be any vector and Pi an arbitrary projector onto a rdimensional subspace. Let U be drawn from the unitary Haar measure. Then,

PrU[PiUu2(1±Δ)rdu2]4exp{Δ2r16}, (16)

Proof.

This follows readily from Fact 14 via linearity. Apply Fact 14 to uu2 while multiplying both PiUu/u22 and (1±Δ)rd by u2.

For a fixed unitary U, let |ψi=PiU|ψ|PiU|ψ| and |ϕi=PiU|ϕ|PiU|ϕ| be the normalized projections of |ψ and |ϕ into the subspace given by Pi. We will now show that, with high probability over the choice of U, |ψi|ϕi|2|ψ|ϕ|2.

Lemma 16.

Let Δ>0. Then,

PrU[||ϕi|ψi|2|ϕ|ψ|2|16Δ for every i[d/r]]1O(d/rexp(Δ2r/16)). (17)

Proof.

Using Fact 14, with probability at least 116exp{Δ2r16}, the following four conditions hold

PiU|ψ2,PiU|ϕ2 (1±Δ)rd, (18)
PiU(|ψ|ϕ)2 (1±Δ)rd|ψ|ϕ2, (19)
PiU(|ψi|ϕ)2 (1±Δ)rd|ψi|ϕ2. (20)

We now follow steps similar to those of [25, Theorem 1] to obtain

|ϕi|ψiψ|ϕ|8Δ. (21)

Let x,y be such that |xy|Δ. Then,

||x|2|y|2| =|(|x||y|)(|x|+|y|)|Δ(|x|+|y|). (22)

In our case, this implies that

|ϕi|ψi|2|ψ|ϕ|2±16Δ. (23)

Taking a union bound over all d/r subspaces completes the proof.

Now, after receiving m pairs of post-projected states, Bob then performs m many SWAP tests. A SWAP test on the pair |ψi and |ϕi succeeds with probability 12+12|ϕi|ψi|212+12|ϕ|ψ|±8Δ. The expected value of the sample average s/m then satisfies

|𝔼[sm]1212|ψ|ϕ|2|8Δ, (24)

which implies 2𝔼[sm]1|ϕ|ψ|2±16Δ, and by a Hoeffding bound, we get

2|sm𝔼[sm]|δ, (25)

with probability at least 12exp(2mδ2). In this case, the total error of the estimator is at most 16Δ+δ. For constant error, m=O(1) suffices.

It remains to determine k needs to be to obtain m=O(1) projected pairs with high probability. To this end, let Ea,b be an indicator variable for if Alice’s ath projection falls into the same subspace as Bob’s bth projection. The expected number of collisions is given by

a,b𝔼[Ea,b]=k2i𝖳𝗋[PiUψU]𝖳𝗋[PiUϕU] k2(1Δ)4rd, (26)

where the inequality follows from PiU|ψ,PiU|ϕ(1Δ)rd. By a Hoeffding bound, it suffices to take k=Ω(d/r) to obtain a collision with high probability. As we only require a constant number of pairs, this can simply be repeated a constant number of times to obtain a constant number of collisions with high probability. Thus, the protocol succeeds for k=Ω(d/r). It remains to pick Δ and δ such that the claims go through: we require that drexp(Δ2r/16)=O(1), which can be achieved by letting Δ=O(1) and r=Ω(logd).

4 Generalized Distributed Inner Product Estimation

Now we turn to bilinear forms f:dd. Any such form can be expressed as f(u,v)=uMv for a matrix M. Here we will assume that M is Hermitian, which implies that f(u,v)=f(v,u)¯. Without loss of generality we will assume M to be normalized such that M=1. Due to the unphysical nature of global phases, f(|ψ,|ϕ) is less meaningful than |f(|ψ,|ϕ)|2 and we concern ourselves entirely with this value instead. Of course, the special case of M=𝕀 corresponds to inner product estimation. Fixing such an M, let Pε be a projector which annihilates all eigenspaces of M of eigenvalue less than ε/2. We define dε to be the dimension of the support of Pε. Now define Mε=PεMPε. The intuition behind this is that we can drop eigenspaces with small weights in estimating |ϕ|M|ψ|2. The following lemma formalizes this.

Lemma 17.

Let M be a Hermitian operator and Mε=PεMPε, then

||ϕ|M|ψ|2|ϕ|Mε|ψ|2|ε/2. (27)

Proof.

|𝖳𝗋[MψMϕ]𝖳𝗋[MεψMεϕ]| =|𝖳𝗋[ψ(MϕMMεϕMε)]| (28)
=|vec(ψ)(MMMεMε)Tvec(ϕ)| (29)
MMMεMεε/2, (30)

where the second line uses the linear map vec:() defined by vec(|ij|)=|i|j and the identity vec(AXB)=(AB)Tvec(X).

Using this lemma, if Alice and Bob can estimate |ϕ|Mε|ψ|2 up to precision ε/2, that directly implies an ε-approximation to the quantity |ϕ|M|ψ|2. For the remainder of this section, we will be primarily focused on upper and lower bounds for estimating |ϕ|Mε|ψ|2.

With this notation, in this section our main result will be the following theorem, proving close-to-optimal upper and lower bounds for estimating bilinear forms on |ψ,|ϕ.

Theorem 18.

For every M with M1, with only 𝖫𝖮𝖢𝖢, it is sufficient to obtain

k=O(max{1/ε2,Mε2/ε})

copies of |ψ,|ϕ to estimate |ϕ|M|ψ|2 to error ε with high prob. and it necessary to obtain

k=Ω(max{1/ε2,Mε2/ε})

copies to produce an ε-approximation to |ϕ|M|ψ|2.

4.1 Upper Bound

Input: An operator M. Alice gets |ψk, Bob gets copies of |ϕk.

Output: An ε-approximation of ψ|M|ϕ|2.

  1. 1.

    Alice and Bob each perform the two-outcome measurement {Pε,𝕀Pε} on each of the k copies of their respective states and obtain sa and sb copies of the states projected into one of the two subspace. If sa=0 or sb=0 then Alice and Bob simply output 0.

  2. 2.

    Alice and Bob independently perform the standard POVM in the symmetric subspace on the support of Mε, obtaining the classical outcomes |u and |v.

  3. 3.

    Alice communicates |u and sa to Bob who outputs

    w:=(dε+sa)(dε+sb)k2|u|Mε|v|2𝖳𝗋[M2]k2. (31)
Figure 2: Protocol to estimate |ϕ|Mε|ψ|2 using only 𝖫𝖮𝖢𝖢.

In Figure 2 we outline a protocol that estimates |ϕ|Mε|ψ|2. Recall that the standard POVM on the symmetric subspace, def 5, has continuous aspects {(d+k1k)φk||φd}. This can be extended to kW for arbitrary subspaces Wd:

{(dimW+k1k)φk||φW}. (32)

The second step of the protocol of Figure 2 has Alice and Bob implementing this POVM for ImPεd. Since they may not have k copies after the projection step, this is a POVM on saImPε and sbImPε, respectively. First note that if Pε|ψ=0 or Pε|ϕ=0 then they always output 0, which must be a good estimate in this case. Thus, we assume that |ψε=Pε|ψ/Pε|ψ and |ϕε=Pε|ϕ/Pε|ϕ both exist. The technical lemmas that we prove are the mean and variance of our estimators, whose proofs we defer to the full version [4].

Lemma 19.

The expected value of the estimator w given in Figure 2 is

𝔼[w]=|ϕ|Mε|ψ|2+𝖳𝗋[Mε2ϕε]k𝖳𝗋[Pεψ]+𝖳𝗋[Mε2ψε]k𝖳𝗋[Pεϕ]. (33)
Lemma 20.

The variance of the estimator of Figure 2 is upper bounded by

Var(w)=𝒪(1k+Mε22k2+Mε4k4). (34)

Our estimator is biased, but the bias is at most 2/k. Taking

k=Ω(max{1ε2,Mε22ε}),

ensures that both the variance and bias are small enough that Alice and Bob’s estimate is within ε/2 of |ϕ|Mε|ψ|2 and thus within ε of |ϕ|M|ψ|2 (with high probability).

4.2 Lower Bound

We now prove the claimed lower bounds in Theorem 18. The first, Ω(1/ε2) follows from lemma 13 in [3]. We restate their argument here slightly adapted to our setup.

Lemma 21.

Say there is an algorithm acting on ρkσk that outputs an estimate of 𝖳𝗋[MρMσ] to accuracy ε with high probability. Then, k=Ω(1/ε2).

Proof.

Let |0 be such that M|0=±1, which exists for since M=1 and the unit sphere is compact. Let |1 be an eigenvector of M orthogonal to |0. Consider the states

|ψ0=12ε|0+12+ε|1,|ψ1=12+ε|0+12ε|1. (35)

Now, say that Alice is given k copies of |ψ0 or |ψ1 and Bob is given k copies of |0. We have that

|ψ0|M|0|2=12ε,|ψ1|M|0|2=12+ε. (36)

Thus, if Alice and Bob can estimate |ψ|M|ϕ|2 to accuracy ε, they can distinguish between these two states. However, the fidelity between these states is given by

F(ψ0k,ψ1k)=(14ε2)k14kε2, (37)

which implies that k=Ω(1/ε2).

Before proving the second lower bound, we give some intuition. Say that M0.If |ψ and |ϕ are drawn independently from the Haar measure, then

𝔼[𝖳𝗋[MψMϕ]] =𝖳𝗋[M2]/d2. (38)

If they are identical, that is ψ=ϕ always, then instead the expected value is

𝔼[𝖳𝗋[MψMψ]] =1d(d1)(𝖳𝗋[M2]+𝖳𝗋[M]2). (39)

The difference between these two is roughly 𝖳𝗋[M]2/d2. Thus, if Alice and Bob are able to estimate |ψ|M|ϕ|2 to this order, then they can solve DIPE (that we defined as Problem 9). However, 𝖳𝗋[M]2/d2 may be quite small. Restricted to the support of Mε, we instead have that ε2/4𝖳𝗋[Mε]2/dε21. We will show that if Alice and Bob can estimate |ϕ|Mε|ψ|2, then they can solve the following decision problem, which is known to require k=Ω(dim/ε) samples [3] (when ε0.01).

Definition 22 (Inner product estimation, ε decision version).

Let ε>0. Alice and Bob are given k copies each of pure states |ψ,|ϕ, for some finite dimensional Hilbert space . They are asked to decide, using 𝖫𝖮𝖢𝖢, which of the following two scenarios they are in:

  • YES instance:

    |ψ=1εeiθ|0+ε|χ,|ϕ=1εeiθ|0+ε|χ, (40)

    where |χ is drawn from the Haar measure on the orthogonal complement of |0 and θ and θ are independently and uniformly drawn from [0,2π).

  • NO instance:

    |ψ=1εeiθ|0+ε|χ,|ϕ=1εeiθ|0+ε|φ, (41)

    where |χ and |φ are drawn independently from the Haar measure on the orthogonal complement of |0 and θ and θ are independently and uniformly drawn from [0,2π).

We will require the two following technical lemmas in proving the lower bound. Here Lipschitz constants are taken to be with respect to the Euclidean norm 2.

Fact 23 (Levy’s Lemma).

If f:𝕊d is λ-Lipschitz, then

Pru[|f(u)𝔼[f(u)]|t]2edt22λ2, (42)

where u is drawn from the Haar measure on 𝕊d.

Lemma 24.

Let c<1 be a sufficiently small constant. Say there is a protocol acting on ρkσk via 𝖫𝖮𝖢𝖢 that outputs an estimate of 𝖳𝗋[MρMσ] to accuracy cε with high probability. Then, k=Ω(Mε1/εdε).

Proof.

Let M|0=|0 be stabilized by M. Such a vector exists by considering either M or M, and we choose the appropriate sign without loss of generality. Let W={|ψd|0|ψ=0}ImPε and Mε~=Mε|W. Without loss of generality we assume that Mε~ is a (semi)definite matrix. Indeed, let Mε~=Mε~+Mε~ then Mε~22=Mε~+22+Mε~22. Of course, this means that Mε~+2Mε~2/2 or Mε~2Mε~2/2. Thus, we restrict ourselves further and consider the subspace, again labeled by W, in the support of the operator with a larger norm.

We will now show that estimating |ϕ|M|ψ|2 suffices to solve problem 22 with high probability where =|0W. Let d~:=dimW. Set the precision parameter in problem 22 to be δ:=εd~/200𝖳𝗋[Mε~] and define ϑ:=θθ. Since 𝖳𝗋[Mε~]εd~/2, δ0.01 as required. Let f be Alice and Bob’s estimate of |ϕ|M|ψ|2, and say that it is within cε of the true value with probability at least 0.99. Then, if f lies in the range [(1δ)23cε,(1δ)2+cε], they 𝖱𝖤𝖩𝖤𝖢𝖳. Otherwise, they 𝖠𝖢𝖢𝖤𝖯𝖳. We split the proof into the two cases.

YES instance: in this case

|ϕ|M|ψ|2 =(1δ)2+δ2𝖳𝗋[Mχ]2+2δ(1δ)cosϑ𝖳𝗋[Mχ]. (43)

Thus,

Pr[f[(1δ)2δ8,(1δ)2+x]] (44)
Pr[δ2𝖳𝗋[Mχ]2+2δ(1δ)cosϑ𝖳𝗋[Mχ][δ8cε,δ8+cε]]+0.01. (45)

𝖳𝗋[Mχ] is 2-Lipschitz:

|ψ|M|ψϕ|M|ϕ| =|(ψ|ϕ|)M|ψϕ|M(|ϕ|ψ)| (46)
|(ψ|ϕ|)M|ψ|+|ϕ|M(|ϕ|ψ)| (47)
2|ψ|ϕ, (48)

where the final inequality follows from M=1 and Cauchy-Schwarz. Then, using fact 23, it holds that

Pr[|𝖳𝗋[Mχ]𝔼χ[𝖳𝗋[Mχ]]|7d~]>0.99. (49)

We now have that 7d~𝖳𝗋[Mε~]4d~, since 28/d~ε. But notice that if ε=o(1/d), then the lower bound k=Ω(1/ε2)=Ω(d) dominates since Mε2/εd~/ε=o(1/ε2). The above bounds imply that we can take 𝖳𝗋[Mχ]225𝖳𝗋[Mε~]2/16d~2. We are then interested in the probability

Pr[2δ(1δ)3𝖳𝗋[Mε]~4d~cosϑ[δ8cεδ225𝖳𝗋[Mε~]216d~2,δ8+cεδ2𝖳𝗋[Mε~]2d~2]]. (50)

Now, by construction δ0.01 and thus 2(1δ)99/50. It follows that

2δ(1δ)3𝖳𝗋[Mε]~4d~29740000ε. (51)

Then, the above probability is upper bounded by

Pr[cosϑ[1225ε4752,12+ε297]] Pr[cosϑ[0.51,0.51]]0.34. (52)

In total, they accept in the YES case with probability at least 0.66.

NO instance: in this case

|φ|M|χ|2 =(1δ)2+δ2𝖳𝗋[MφMχ]+2δ(1δ)Re(eiϑφ|M|χ). (53)

By symmetry, 𝔼[Re(eiϑφ|M|χ)]=0. Now, fixing |φ, |φ|M|χ| is 1-Lipschitz in |χ. This implies that |φ|M|χ|8/d~ with probability at least 0.999. This then implies that 𝖳𝗋[MφMχ]84/d~. Then, we have that

||φ|M|χ|2(1δ)2|δd~(84d~+16). (54)

Further, δ/d~1/100d~. We assume that 84/d~<1 (as otherwise the lower bound is constant anyways) and obtain

||φ|M|χ|2(1δ)2|17100d~. (55)

We require that this is less then cε/3. This requires that ε=Ω(1/d~), but, as previously stated, we assume this as otherwise the other lower bound dominates. The total probability for this instance to be rejected is then at least 0.9.

Thus, Alice and Bob are able to solve problem 22 with high probability. Then, it must be that k=Ω(d~/δ)=Ω(𝖳𝗋[Mε~]/εd~).

Corollary 25.

Let c<1 be a sufficiently small constant. Say there is a protocol acting on ρkσk via 𝖫𝖮𝖢𝖢 that outputs an estimate of 𝖳𝗋[MρMσ] to accuracy cε with high probability. Then, k=Ω(Mε2/ε).

Proof.

Lemma 24 yields a lower bound of k=Ω(𝖳𝗋[Mε~]/εd~). Using 𝖳𝗋[Mε~]Mε~22 and Mε~2εd~/2, we arrive at our claimed lower bound of k=Ω(Mε2/ε).

References

  • [1] Pablo Andres-Martinez, Tim Forrer, Daniel Mills, Jun-Yi Wu, Luciana Henaut, Kentaro Yamamoto, Mio Murao, and Ross Duncan. Distributing circuits over heterogeneous, modular quantum computing network architectures. Quantum Science and Technology, 9(4):045021, 2024.
  • [2] Anurag Anshu and Srinivasan Arunachalam. A survey on the complexity of learning quantum states. Nature Reviews Physics, 6(1):59–69, 2024.
  • [3] Anurag Anshu, Zeph Landau, and Yunchao Liu. Distributed quantum inner product estimation. In Proceedings of the 54th Annual ACM SIGACT Symposium on Theory of Computing, pages 44–51, 2022. doi:10.1145/3519935.3519974.
  • [4] Srinivasan Arunachalam and Louis Schatzki. Distributed inner product estimation with limited quantum communication. arXiv preprint, 2024. doi:10.48550/arXiv.2410.12684.
  • [5] Costin Bădescu, Ryan O’Donnell, and John Wright. Quantum state certification. In Proceedings of the 51st Annual ACM SIGACT Symposium on Theory of Computing, pages 503–514, 2019. doi:10.1145/3313276.3316344.
  • [6] Adriano Barenco, Andre Berthiaume, David Deutsch, Artur Ekert, Richard Jozsa, and Chiara Macchiavello. Stabilization of quantum computations by symmetrization. SIAM Journal on Computing, 26(5):1541–1557, 1997. doi:10.1137/S0097539796302452.
  • [7] Charles H Bennett, David P DiVincenzo, Christopher A Fuchs, Tal Mor, Eric Rains, Peter W Shor, John A Smolin, and William K Wootters. Quantum nonlocality without entanglement. Physical Review A, 59(2):1070, 1999.
  • [8] Michael Brannan. Alice and bob meet banach: The interface of asymptotic geometric analysis and quantum information theory, 2021.
  • [9] Harry Buhrman, Richard Cleve, John Watrous, and Ronald De Wolf. Quantum fingerprinting. Physical review letters, 87(16):167902, 2001.
  • [10] Kean Chen, Qisheng Wang, Peixun Long, and Mingsheng Ying. Unitarity estimation for quantum channels. IEEE Transactions on Information Theory, 69(8):5116–5134, 2023. doi:10.1109/TIT.2023.3263645.
  • [11] Kean Chen, Qisheng Wang, and Zhicheng Zhang. Local test for unitarily invariant properties of bipartite quantum states. arXiv preprint, 2024. doi:10.48550/arXiv.2404.04599.
  • [12] Sitan Chen, Jerry Li, Brice Huang, and Allen Liu. Tight bounds for quantum state certification with incoherent measurements. In 2022 IEEE 63rd Annual Symposium on Foundations of Computer Science (FOCS), pages 1205–1213. IEEE, 2022. doi:10.1109/FOCS54457.2022.00118.
  • [13] Eric Chitambar, Debbie Leung, Laura Mančinska, Maris Ozols, and Andreas Winter. Everything you always wanted to know about locc (but were afraid to ask). Communications in Mathematical Physics, 328:303–326, 2014.
  • [14] Scott M Cohen. Understanding entanglement as resource: Locally distinguishing unextendible product bases. Physical Review A – Atomic, Molecular, and Optical Physics, 77(1):012304, 2008.
  • [15] Jacob P Covey, Harald Weinfurter, and Hannes Bernien. Quantum networks with neutral atom processing nodes. npj Quantum Information, 9(1):90, 2023.
  • [16] Andreas Elben, Benoît Vermersch, Rick van Bijnen, Christian Kokail, Tiff Brydges, Christine Maier, Manoj K Joshi, Rainer Blatt, Christian F Roos, and Peter Zoller. Cross-platform verification of intermediate scale quantum devices. Physical review letters, 124(1):010504, 2020.
  • [17] Heng Fan. Distinguishability and indistinguishability by local operations and classical communication. Physical Review Letters, 92(17):177905, 2004.
  • [18] Ranjani G Sundaram, Himanshu Gupta, and CR Ramakrishnan. Efficient distribution of quantum circuits. In 35th International Symposium on Distributed Computing (DISC 2021). Schloss Dagstuhl – Leibniz-Zentrum für Informatik, 2021.
  • [19] Giovanni Guccione, Tom Darras, Hanna Le Jeannic, Varun B Verma, Sae Woo Nam, Adrien Cavaillès, and Julien Laurat. Connecting heterogeneous quantum networks by hybrid entanglement swapping. Science advances, 6(22):eaba4508, 2020.
  • [20] Aram W Harrow. The church of the symmetric subspace. arXiv preprint, 2013. arXiv:1308.6595.
  • [21] Marcel Hinsche, Marios Ioannou, Sofiene Jerbi, Lorenzo Leone, Jens Eisert, and Jose Carrasco. Efficient distributed inner product estimation via pauli sampling. arXiv preprint, 2024. arXiv:2405.06544.
  • [22] Christopher Monroe, Robert Raussendorf, Alex Ruthven, Kenneth R Brown, Peter Maunz, L-M Duan, and Jungsang Kim. Large-scale modular quantum-computer architecture with atomic memory and photonic interconnects. Physical Review A, 89(2):022317, 2014.
  • [23] Michael A Nielsen and Isaac L Chuang. Quantum computation and quantum information. Cambridge university press, 2010.
  • [24] A Pirker, J Wallnöfer, and W Dür. Modular architectures for quantum networks. New Journal of Physics, 20(5):053054, 2018.
  • [25] Pranab Sen. A quantum johnson-lindenstrauss lemma via unitary t-designs. arXiv preprint, 2018. arXiv:1807.08779.
  • [26] Guifré Vidal and Rolf Tarrach. Robustness of entanglement. Physical Review A, 59(1):141, 1999.
  • [27] Stephanie Wehner, David Elkouss, and Ronald Hanson. Quantum internet: A vision for the road ahead. Science, 362(6412):eaam9288, 2018.
  • [28] Jun-Yi Wu, Kosuke Matsui, Tim Forrer, Akihito Soeda, Pablo Andrés-Martínez, Daniel Mills, Luciana Henaut, and Mio Murao. Entanglement-efficient bipartite-distributed quantum computing. Quantum, 7:1196, 2023. doi:10.22331/Q-2023-12-05-1196.
  • [29] Zhi-Chao Zhang, Fei Gao, Tian-Qing Cao, Su-Juan Qin, and Qiao-Yan Wen. Entanglement as a resource to distinguish orthogonal product states. Scientific reports, 6(1):30493, 2016.