Generalized Inner Product Estimation with Limited Quantum Communication
Abstract
In this work, we consider the fundamental task of distributed inner product estimation when allowed limited communication. Suppose Alice and Bob are given copies of an unknown -qubit quantum state respectively, are allowed to send qubits to one another, and the task is to estimate up to constant additive error. We show that copies are essentially necessary and sufficient for this task (extending the work of Anshu, Landau and Liu (STOC’22) who considered the case when ). Additionally, we also consider the task when the goal of the players is to estimate , for arbitrary Hermitian . For this task we show that certain norms on determine the sample complexity of estimating when using only classical communication.
Keywords and phrases:
Quantum property testing, Quantum Distributed AlgorithmsCopyright and License:
![[Uncaptioned image]](x1.png)
2012 ACM Subject Classification:
Theory of computation Quantum information theoryFunding:
We acknowledge support from IBM through the Illinois-IBM Discovery Accelerator Institute.Editors:
Olaf Beyersdorff, Michał Pilipczuk, Elaine Pimentel, and Nguyễn Kim ThắngSeries and Publisher:

1 Introduction
The construction of quantum networks is a major goal in quantum information science [22, 27, 24, 15]. These networks are envisioned to consist of disjoint quantum processing nodes with quantum communication interlinks, likely implemented through photonics. While the nodes may consist of the same type of qubit, this is not a requirement, and work has gone into designing heterogeneous networks where the nodes have different physical compositions [19]. With this in mind it is of interest to develop distributed protocols in a platform-independent framework.
In this paper we consider a natural distributed variant of the inner product estimation problem: suppose there are two spatially separated parties Alice and Bob who are each given copies of an unknown -dimensional quantum state and respectively and their goal is to compute for some Hermitian operator . We will be interested in the difficulty of this task depending on how much entanglement Alice and Bob share. The core motivation for our setup is that distributing entanglement between nodes in a network is not a free resource and adds time and difficulty to a protocol. Thus, it is useful to minimize the amount of entanglement required. Similar concerns arise in various papers on distributed quantum computing [28, 18, 1].
We call this the generalized distributed inner product estimation problem (GIPE). The setting of in GIPE (which we refer to as distributed inner product estimation DIPE) is one of the important steps in cross-platform verification proposed in [16] where the goal is to test if two quantum computers (say built on different platforms) are preparing the same quantum state; a fundamental problem for near-term devices. A natural constraint in these papers is how the quantum computers communicate with one another and in these works they consider either only classical communication or limited quantum communication (the latter being the focus of our work). Apart from verification, on a theoretical level, understanding the complexity of a question, as fundamental as inner product estimation, in a distributed manner is a natural question.
The seminal work of Buhrman, Cleve, Watrous and Wolf [9] on quantum fingerprinting introduced the so-called swap test. This subroutine takes as input one copy of unknown quantum states and and outputs a bit whose bias equals ; allowing us to estimate the inner product between two unknown quantum states without knowing anything about the states themselves. This subroutine has found applications in several areas in quantum computing from complexity theory, learning theory, entanglement theory, to optimization. Although so widely used, there still remain some open fundamental questions about estimating inner products, which is the topic of this work.
There are two techniques to solve GIPE under different settings: If allowed quantum communication, then Alice can send a few copies of the -dimensional quantum state over to Bob, then Bob could perform a variant of the swap test to estimate ; if allowed only classical communication, i.e., Alice and Bob only send classical messages, then a recent work of Anshu et al. [3] showed that copies of are necessary and sufficient in order to estimate . This setting is often referred to as local operations and classical communication () and has received a lot of attention in quantum information theory [13, 7, 17]. Although is surprising in that, the sample complexity is quadratically better than full-state tomography, the exponential (since we typically work with , where is the number of qubits) nature of the complexity seems rather large in practice. Their work raises two natural questions, which will be the focus here:
-
1.
With the advent of near-term quantum devices, sending the full-quantum state (as in the protocol above) might be hard, but it is plausible that one could send a few qubits of quantum message. If this were possible, then what is the complexity of DIPE when allowed -qubit messages?
-
2.
The work of Anshu et al. [3] showed how to solve GIPE when , but other natural properties of quantum states are captured by letting be an arbitrary operator, for example, predicting few-body properties, such as two-point correlation functions, entanglement entropy of small subsystems, expectation values of observables, projector onto a subspace or perhaps a Pauli string, then may be different than . In this case, understanding the complexity of GIPE for arbitrary is relevant.
These questions were explicitly raised by Anshu et al. [3] (and as open question 21 in [2]) and in this work we answer both.
1.1 Results
Our first result considers the setup where Alice and Bob may communicate a few qubits in an interactive protocol but not necessarily enough to teleport copies of their states. For simplicity assume that Alice and Bob each have -qubit states and can transmit in total qubits of communication. As we mentioned above, the sample complexity when was shown to be by [3] and when , the sample complexity is . Is there some saving in sample complexity when allowed qubits of communication? Our first result shows a smooth interpolation between both these settings.
Theorem 1 (Informal).
Suppose Alice and Bob are given copies of -qubit states and respectively can communication qubits along with performing . Then it is necessary and sufficient for them to obtain
copies of their states to estimate up to constant accuracy with high probability.111We will state the constants in this theorem more clearly when proving this theorem.
The upper bound shows that quantum communication may help. However, to reach sub-exponential scaling, a large amount of quantum communication is necessary i.e., unless , our lower bound is still exponential in . Informally, entanglement helps, but not too much.
Our next result concerns the sample complexity, under , of GIPE, i.e., for arbitrary Hermitian operators . A natural possibility when estimating is that, perhaps Alice and Bob only need to confirm that their states have a large overlap in one of several smaller subspaces “within ”. Then, it is conceivable that this task would be much easier than full inner product estimation (i.e., when ). We show that this is indeed the case! Let be restricted to subspaces with eigenvalue of magnitude at least . We prove the following near-optimal results for general GIPE.
Theorem 2 (Informal).
For every with and , to estimate to error , it is sufficient to obtain
copies of and
copies are necessary.
Interestingly, this implies that having both positive and negative eigenvalues may not render estimation harder than definite operators. Take Pauli strings as an example, an important set of operators in quantum information. These have eigenspaces of eigenvalues each of dimension . Then, in evaluating there may be cancellations between components of the states lying in eigenspaces of different signs. However, our results show that estimating such an is no harder than estimating , which is positive definite and basis independent. While our upper and lower bounds do not exactly match, this is partially due to choice of presentation. The lower bound we prove is actually , where is the dimension of the support of . Converting to norm yields the lower bound as presented above. However, in some cases this more precise bound is tight. Take, for example, a projector onto a subspace or a Pauli string. Then, we obtain the lower bound , exactly matching the upper bound.
Proof sketch.
In [3], they prove their lower bound using a very interesting connection to quantum cloning: in particular, they show that if one could solve a decision-version of DIPE, then one could have cloned the states “well-enough”. One of the main challenges in proving our lower bound was that the cloning-based lower bounds do not work when allowed even few qubits of communication in the cloning channel (which is the setting in which we would like lower bounds). Instead, here we showed that one could use the notion of robustness of entanglement, a concept from entanglement theory and split a protocol with a quantum channel into a sum of LOCC protocols. Proving this is a small technical lemma which we combine with the lower bound of [3] to obtain our overall lower bound of . In order to prove our upper bound, we use ideas from the celebrated Johnson-Lindenstrauss lemma. Our main idea is to perform projections onto random subspaces, i.e., Alice and Bob pick random subspaces and project their states onto these subspaces, maintaining the inner product between their states with high probability. Further, this protocol is completely agnostic to the states they started with. Now holding smaller-dimensional projections of their states, they can use classical communication to detect when their subspace-projections have collisions, use their shared quantum channel and perform tests to estimate the inner product within the subspace. With some analysis, we are able to show that the overall sample complexity for this scales as as well, matching our lower bound.
For estimating bilinear forms, our protocol is fairly similar to the one in [3] except that we need to deal with some technicalities due to the Hermitian operator . The key observation we first make is that and can only differ by at most . So it suffices for Alice and Bob to restrict themselves to the support of . Then, they can simultaneously measure the magnitude of the components of their states in this subspace as well as the weighted inner product of said components. The calculations here are similar to the one in [3] wherein one needs to compute the mean variance of the estimator, but a little bit more technical in order to bound all the terms in terms of . The lower bound follows from realizing that when restricted to its support, is not too far off from identity and then we can invoke the lower bounds for inner product estimation can be applied. We remark that the lower bound here is much more subtle than the one in [3] since one needs to project onto the eigenspaces of carefully in order to get the optimal dependence on .
1.2 Related works and open questions
Like we mentioned earlier, our work answers two open questions raised by Anshu et al. [3]. There have been a few more papers since their work: Hinsche et al. [21] look at specific instantiations of DIPE (when the protocol used by Alice and Bob are Pauli sampling and the quantum states are structured) and prove some positive and negative results to this end. Chen et al. [10] extend the work of [3] by proving better bounds for non-trace-preserving quantum channels, Chen et al. [11] also looked at quantum property testing in the model.
Distinguishability under LOCC has a rich history in the quantum information literature. Bennett, et al. demonstrated that there exist product bases which are easily distinguished, but are indistinguishable under LOCC [7]. Enough entanglement renders this task easy as the two parties can simply teleport states. Subsequent works showed that much less entanglement may suffice for this task [14, 29]. Unlike our framework, these papers concerned themselves with measurements of a single copy and further identifying states from some known ensemble, rather than learning some property.
A natural open question.
A tantalizing open question left open by [3] and also this work is the analogue of DIPE in the mixed case setting. Here the goal is as follows: Alice has copies of , Bob has copies of and they engage in . They need to distinguish if or , promised one of them is the case. Using the bounds obtained in [3], we have an upper bound of . As for lower bounds, [5] showed that if Alice also had copies of (instead of Bob having them), then one can solve this property testing task using copies (this procedure requires a highly-entangling operation between copies of and ). Furthermore, if we restricted the measurements to be single-copy measurements and if we fix , then copies are necessary [12]. Despite several attempts in making progress on this question, we have not been able to obtain a lower bound better than and believe that the sample complexity of mixed state DIPE should be . We leave this as an open question.
2 Preliminaries
2.1 Quantum States and Measurements
Pure quantum states are unit vectors in . A qubit is a state in and -qubits is a state in . Mixed states, also known as density matrices, , are positive semi-definite operators on with unit trace. Pure states correspond to rank 1 mixed states and we will routinely use the notation to refer to the density matrix corresponding to a pure state . Measurements of quantum systems are described by positive operator valued measures (POVMs), ensembles of positive semi-definite operators such that . The probability of observing an outcome is given by . By we denote the operator norm of an operator.
In quantum computation states are manipulated via unitary evolution. That is, is mapped to for some unitary . An important unitary we will make repeated usage of is the gate on a bipartite state. This has the action .
Operators on two Hilbert spaces and lie in the tensor product space . A positive semi-definite operator acting on these tensor product space is said to be separable if it admits a decomposition , where each and are positive semi-definite. We will be interested in separable POVMs, where each aspect is separable. These are measurements that cannot create entanglement between distributed parties. However, such measurements may still go beyond those achievable with classical communication. With this in mind, one can define local operations and classical communication () [13]. This can roughly be defined as all protocols where Alice performs some measurement in her lab, communicates the result to Bob, who then performs a measurement in his lab and communicates the result to Alice and so on. However, the set of measurements is mathematically unwieldy and it is generally easier to prove results regarding separable measurements. An -bit is a standard resource of entanglement in quantum information. This is a shared two qubit resource state . With -bits and classical communication, two distributed parties can teleport an qubit state [23].
2.2 Subroutines
We will make repeated reference to the test, which can be used to estimate the overlap between two states and [6, 9].
Definition 3 ( test).
Given two mixed states and and an ancilla qubit initialized in the state , the test performs the unitary and measures the ancilla in the computation basis. The measurement probabilities are given by
Via standard amplification arguments, trials are sufficient to estimate to error . Using block-encodings, this can be extended to estimating for an arbitrary hermitian such that . Again, standard amplification arguments show that trials suffices to estimate . We will also use the standard POVM on the symmetric subspace. The symmetric group has a natural action on the state space of given by
(1) |
Definition 4 (Symmetric Subspace).
The -copy symmetric subspace of a vector space , is given by
The symmetric subspace has a natural spanning set given by [20]. Due to being an irreducible representation of the unitary group (under the action ), we can define a uniform POVM on the symmetric subspace, which is known as the standard POVM.
Definition 5 (Standard POVM on ).
The standard POVM on is the continuous POVM with elements
(2) |
We require one last fact about the symmetric subspace:
Fact 6 (Haar moments).
If is drawn from the Haar measure on , then
(3) |
3 Estimating Inner Product
In this section we consider the following task: Alice and Bob each have copies of unknown -dimensional states and . They may use any amount of classical communication and some restricted quantum communication. Their goal is to estimate using as few samples of and as possible. Here we will assume the desired measurement precision is some constant.
Theorem 7.
Suppose Alice and Bob share a -qubit entangled state, can perform measurements on copies of their respective -dimensional states and respectively and engage in unbounded classical communication. If they are able to estimate to accuracy with high probability, then are necessary.
Theorem 8.
Suppose Alice and Bob share a -qubit entangled state, can perform measurements on copies of their respective -dimensional states and respectively and engage in unbounded classical communication. It suffices to obtain copies, in order to estimate to accuracy with high probability.
We remark that there is a constant-factor difference in the amount of entanglement bounds in the upper and lower bound. This largely seems to stem from the sample complexity still being greater than even when : say that Alice is able to transmit her state exactly and Bob does the swap test. Even then, in order to compute the inner product to error , they need to repeat the swap test constantly many times. Our lower bound for this setting would imply a constant lower bound as well (matching the upper bound, but not “exactly” since it would be a constant-factor off). Regardless, our lower bound can be understood as saying that entanglement does not help for inner product estimation unless the shared entanglement dimension scales with .
3.1 Lower bound in main theorem
To obtain a lower bound we consider the decision problem constructed in [3] (which is called the DIPE, distributed inner product estimation problem). Alice and Bob are promised to be in one of the following two scenarios. Their version restricts Alice and Bob to protocols. However, here we allow them to share some resource state as well.
Definition 9 (Distributed Inner Product Estimation, Decision Version).
Alice and Bob each have access to copies of the states and in respectively and are asked to decide, using and perhaps a resource state , which of the following two scenarios they are in:
-
YES: and they are Haar random
-
NO: are Haar random.
Say that Alice and Bob are able to transmit a dimensional quantum message. Because of quantum teleportation, this communication channel is equivalent, under , to sharing a -dimensional maximally entangled state. Going forward, we let be the state Alice and Bob share.
We also introduce a measure of entanglement called the robustness of entanglement.
Definition 10 (Robustness of entanglement [26]).
Any quantum state can be decomposed as , where and are both separable states and . The minimum value of over all such decompositions is called the robustness of entanglement. We denote this minimum value by .
In particular, we will use the following lemma.
Lemma 11 ([26]).
If is a pure bipartite state, then the robustness of entanglement is where are the Schmidt coefficients.
Thus, the robustness of entanglement of is (since all of its Schmidt coefficients are ). In [3] they show the following result:
Theorem 12 ([3]).
Let be a separable measurement, then
(4) |
With this we now prove our main theorem lower bound.
Proof of lower bound of Thm 7.
Say that there exists a separable protocol that uses copies of the states and and the resource state and returns an estimate of to accuracy with probability at least . Because of anti-concentration of the Haar measure, Alice and Bob will be able to use this protocol to solve problem 9 with high probability. Let be the ball of radius around in with respect to the Fubini-Study metric, which we will denote as . Then, it is known that, under the uniform distribution, the volume of for is given by [8]. If , then (and for ). Thus, for constant it follows that with exponentially (in ) high probability in case two of 9. Thus, if Alice and Bob use the protocol , they will solve problem 9 with probability at least as well. This implies that there is some separable POVM such that
(5) |
We now show that the RHS of the inequality above can be upper bounded by . To see this, split into , where and are both separable states. Then, it follows that
(6) |
Note that the sign of has been absorbed into the trace in the second term above. Now, because are separable, each term above could be replaced by a separable measurement on without any reference state. To see this, decompose into . Using spectral decompositions and , we arrive at
(7) | |||
(8) |
As a separable measurement, we have . Now define a new measurement
(9) |
where and . As a sum of positive operators, this is positive. As a convex combination of operators majorized by , this is also majorized by . It then follows that is a separable POVM. From Thm 12 it then follows that
(10) |
The same proof shows that
(11) |
Thus, we have that
(12) |
Putting the above along with our lower bound in Eq.(5) shows
(13) |
Rearranging, this implies that
(14) |
So, if Alice and Bob share Bell pairs, then and we get the desired lower bound.
Using techniques similar to [3, Section 5.3], wherein they showed how to use standard concentration techniques to reduce the decision version of DIPE (for which we have a lower bound) to prove a lower bound for estimating the inner product between and with a factor of . In particular, they prove that if there exists a protocol that solves the -version of inner product estimation then it can be used to solve DIPE with high probability. Then, the lower bound on DIPE follows from their reduction.
3.2 Upper bound in main theorem
We now give a protocol which achieves the promised sample complexity of Thm 8. At a high level, the protocol works by randomly projecting and into small-dimensional subspaces. Since such a projection maintains the inner product between two states with high probability, Alice can simply send Bob these smaller dimensional states and Bob can perform a swap test. The reader may notice that this assumes that Alice can transmit an arbitrary state in a -dimensional subspace of a -dimensional space. This, however, does not lead to any issues since Alice knows the subspace the state lies in. Then, any maximally entangled state on a -dimensional subspace can be converted to a maximally entangled state on the desired subspace via a unitary transformation. From there, Alice and Bob simply perform a teleportation protocol.
Theorem 13.
Let . Using copies of and , there is a protocol that uses -dimensional quantum messages, single copy measurements, and returns up to constant error with high probability
Proof.
Let and . Fix some unitary . For convenience of notation we will assume that divides (working with qubits, if Alice and Bob may communicate qubits then this holds). Divide the -dimensional Hilbert space into subspaces each of dimension . Let this decomposition be given by a collection of orthogonal projectors . Alice and Bob perform the protocol in Figure 1.
Input: Alice gets , Bob gets
Output: -approximation of
-
1.
Using shared randomness, Alice and Bob sample a unitary from Haar measure.
-
2.
Alice and Bob apply the POVM on each of the copies and record which copies were projected onto which subspaces.
-
3.
Using a two-way classical communication they determine which copies lie now in the same subspaces. Alice sends Bob a constant number of such projected states which can be paired with a post-projection state of Bob’s. Say the number of such pairs is .
-
4.
Bob performs a test between the post-projected pairs of states lying in the same subspaces. We say a test succeeds if Bob measures on the ancilla register. Let the number of successes be .
-
5.
Bob declares the inner product between and to be .
Our theorem will follow by repeating the protocol above constantly many times, each time by sending a -dimensional quantum message. To see the correctness, we will require the following fact.
Fact 14 ([25, Fact 2]).
Let . Let be a unit vector and be an arbitrary projector onto a -dimensional subspace. Let be drawn from the unitary Haar measure. Then,
(15) |
By linearity this extends to arbitrary vectors in , as the following corollary demonstrates.
Corollary 15.
Let . Let be any vector and an arbitrary projector onto a dimensional subspace. Let be drawn from the unitary Haar measure. Then,
(16) |
Proof.
For a fixed unitary , let and be the normalized projections of and into the subspace given by . We will now show that, with high probability over the choice of , .
Lemma 16.
Let . Then,
(17) |
Proof.
Using Fact 14, with probability at least , the following four conditions hold
(18) | ||||
(19) | ||||
(20) |
We now follow steps similar to those of [25, Theorem 1] to obtain
(21) |
Let be such that . Then,
(22) |
In our case, this implies that
(23) |
Taking a union bound over all subspaces completes the proof.
Now, after receiving pairs of post-projected states, Bob then performs many tests. A test on the pair and succeeds with probability . The expected value of the sample average then satisfies
(24) |
which implies and by a Hoeffding bound, we get
(25) |
with probability at least . In this case, the total error of the estimator is at most . For constant error, suffices.
It remains to determine needs to be to obtain projected pairs with high probability. To this end, let be an indicator variable for if Alice’s th projection falls into the same subspace as Bob’s th projection. The expected number of collisions is given by
(26) |
where the inequality follows from . By a Hoeffding bound, it suffices to take to obtain a collision with high probability. As we only require a constant number of pairs, this can simply be repeated a constant number of times to obtain a constant number of collisions with high probability. Thus, the protocol succeeds for . It remains to pick and such that the claims go through: we require that , which can be achieved by letting and .
4 Generalized Distributed Inner Product Estimation
Now we turn to bilinear forms . Any such form can be expressed as for a matrix . Here we will assume that is Hermitian, which implies that . Without loss of generality we will assume to be normalized such that . Due to the unphysical nature of global phases, is less meaningful than and we concern ourselves entirely with this value instead. Of course, the special case of corresponds to inner product estimation. Fixing such an , let be a projector which annihilates all eigenspaces of of eigenvalue less than . We define to be the dimension of the support of . Now define . The intuition behind this is that we can drop eigenspaces with small weights in estimating . The following lemma formalizes this.
Lemma 17.
Let be a Hermitian operator and , then
(27) |
Proof.
(28) | ||||
(29) | ||||
(30) |
where the second line uses the linear map defined by and the identity .
Using this lemma, if Alice and Bob can estimate up to precision , that directly implies an -approximation to the quantity . For the remainder of this section, we will be primarily focused on upper and lower bounds for estimating .
With this notation, in this section our main result will be the following theorem, proving close-to-optimal upper and lower bounds for estimating bilinear forms on .
Theorem 18.
For every with , with only , it is sufficient to obtain
copies of to estimate to error with high prob. and it necessary to obtain
copies to produce an -approximation to .
4.1 Upper Bound
Input: An operator . Alice gets , Bob gets copies of .
Output: An -approximation of .
-
1.
Alice and Bob each perform the two-outcome measurement on each of the copies of their respective states and obtain and copies of the states projected into one of the two subspace. If or then Alice and Bob simply output .
-
2.
Alice and Bob independently perform the standard POVM in the symmetric subspace on the support of , obtaining the classical outcomes and .
-
3.
Alice communicates and to Bob who outputs
(31)
In Figure 2 we outline a protocol that estimates . Recall that the standard POVM on the symmetric subspace, def 5, has continuous aspects . This can be extended to for arbitrary subspaces :
(32) |
The second step of the protocol of Figure 2 has Alice and Bob implementing this POVM for . Since they may not have copies after the projection step, this is a POVM on and , respectively. First note that if or then they always output , which must be a good estimate in this case. Thus, we assume that and both exist. The technical lemmas that we prove are the mean and variance of our estimators, whose proofs we defer to the full version [4].
Lemma 19.
The expected value of the estimator given in Figure 2 is
(33) |
Lemma 20.
The variance of the estimator of Figure 2 is upper bounded by
(34) |
Our estimator is biased, but the bias is at most . Taking
ensures that both the variance and bias are small enough that Alice and Bob’s estimate is within of and thus within of (with high probability).
4.2 Lower Bound
We now prove the claimed lower bounds in Theorem 18. The first, follows from lemma 13 in [3]. We restate their argument here slightly adapted to our setup.
Lemma 21.
Say there is an algorithm acting on that outputs an estimate of to accuracy with high probability. Then, .
Proof.
Let be such that , which exists for since and the unit sphere is compact. Let be an eigenvector of orthogonal to . Consider the states
(35) |
Now, say that Alice is given copies of or and Bob is given copies of . We have that
(36) |
Thus, if Alice and Bob can estimate to accuracy , they can distinguish between these two states. However, the fidelity between these states is given by
(37) |
which implies that .
Before proving the second lower bound, we give some intuition. Say that .If and are drawn independently from the Haar measure, then
(38) |
If they are identical, that is always, then instead the expected value is
(39) |
The difference between these two is roughly . Thus, if Alice and Bob are able to estimate to this order, then they can solve DIPE (that we defined as Problem 9). However, may be quite small. Restricted to the support of , we instead have that . We will show that if Alice and Bob can estimate , then they can solve the following decision problem, which is known to require samples [3] (when ).
Definition 22 (Inner product estimation, decision version).
Let . Alice and Bob are given copies each of pure states , for some finite dimensional Hilbert space . They are asked to decide, using , which of the following two scenarios they are in:
-
YES instance:
(40) where is drawn from the Haar measure on the orthogonal complement of and and are independently and uniformly drawn from .
-
NO instance:
(41) where and are drawn independently from the Haar measure on the orthogonal complement of and and are independently and uniformly drawn from .
We will require the two following technical lemmas in proving the lower bound. Here Lipschitz constants are taken to be with respect to the Euclidean norm .
Fact 23 (Levy’s Lemma).
If is -Lipschitz, then
(42) |
where is drawn from the Haar measure on .
Lemma 24.
Let be a sufficiently small constant. Say there is a protocol acting on via that outputs an estimate of to accuracy with high probability. Then, .
Proof.
Let be stabilized by . Such a vector exists by considering either or , and we choose the appropriate sign without loss of generality. Let and . Without loss of generality we assume that is a (semi)definite matrix. Indeed, let then . Of course, this means that or . Thus, we restrict ourselves further and consider the subspace, again labeled by , in the support of the operator with a larger norm.
We will now show that estimating suffices to solve problem 22 with high probability where . Let . Set the precision parameter in problem 22 to be and define . Since , as required. Let be Alice and Bob’s estimate of , and say that it is within of the true value with probability at least 0.99. Then, if lies in the range , they . Otherwise, they . We split the proof into the two cases.
YES instance: in this case
(43) |
Thus,
(44) | |||
(45) |
is -Lipschitz:
(46) | ||||
(47) | ||||
(48) |
where the final inequality follows from and Cauchy-Schwarz. Then, using fact 23, it holds that
(49) |
We now have that , since . But notice that if , then the lower bound dominates since . The above bounds imply that we can take . We are then interested in the probability
(50) |
Now, by construction and thus . It follows that
(51) |
Then, the above probability is upper bounded by
(52) |
In total, they accept in the YES case with probability at least .
NO instance: in this case
(53) |
By symmetry, . Now, fixing , is -Lipschitz in . This implies that with probability at least . This then implies that . Then, we have that
(54) |
Further, . We assume that (as otherwise the lower bound is constant anyways) and obtain
(55) |
We require that this is less then . This requires that , but, as previously stated, we assume this as otherwise the other lower bound dominates. The total probability for this instance to be rejected is then at least .
Thus, Alice and Bob are able to solve problem 22 with high probability. Then, it must be that .
Corollary 25.
Let be a sufficiently small constant. Say there is a protocol acting on via that outputs an estimate of to accuracy with high probability. Then, .
Proof.
Lemma 24 yields a lower bound of . Using and , we arrive at our claimed lower bound of .
References
- [1] Pablo Andres-Martinez, Tim Forrer, Daniel Mills, Jun-Yi Wu, Luciana Henaut, Kentaro Yamamoto, Mio Murao, and Ross Duncan. Distributing circuits over heterogeneous, modular quantum computing network architectures. Quantum Science and Technology, 9(4):045021, 2024.
- [2] Anurag Anshu and Srinivasan Arunachalam. A survey on the complexity of learning quantum states. Nature Reviews Physics, 6(1):59–69, 2024.
- [3] Anurag Anshu, Zeph Landau, and Yunchao Liu. Distributed quantum inner product estimation. In Proceedings of the 54th Annual ACM SIGACT Symposium on Theory of Computing, pages 44–51, 2022. doi:10.1145/3519935.3519974.
- [4] Srinivasan Arunachalam and Louis Schatzki. Distributed inner product estimation with limited quantum communication. arXiv preprint, 2024. doi:10.48550/arXiv.2410.12684.
- [5] Costin Bădescu, Ryan O’Donnell, and John Wright. Quantum state certification. In Proceedings of the 51st Annual ACM SIGACT Symposium on Theory of Computing, pages 503–514, 2019. doi:10.1145/3313276.3316344.
- [6] Adriano Barenco, Andre Berthiaume, David Deutsch, Artur Ekert, Richard Jozsa, and Chiara Macchiavello. Stabilization of quantum computations by symmetrization. SIAM Journal on Computing, 26(5):1541–1557, 1997. doi:10.1137/S0097539796302452.
- [7] Charles H Bennett, David P DiVincenzo, Christopher A Fuchs, Tal Mor, Eric Rains, Peter W Shor, John A Smolin, and William K Wootters. Quantum nonlocality without entanglement. Physical Review A, 59(2):1070, 1999.
- [8] Michael Brannan. Alice and bob meet banach: The interface of asymptotic geometric analysis and quantum information theory, 2021.
- [9] Harry Buhrman, Richard Cleve, John Watrous, and Ronald De Wolf. Quantum fingerprinting. Physical review letters, 87(16):167902, 2001.
- [10] Kean Chen, Qisheng Wang, Peixun Long, and Mingsheng Ying. Unitarity estimation for quantum channels. IEEE Transactions on Information Theory, 69(8):5116–5134, 2023. doi:10.1109/TIT.2023.3263645.
- [11] Kean Chen, Qisheng Wang, and Zhicheng Zhang. Local test for unitarily invariant properties of bipartite quantum states. arXiv preprint, 2024. doi:10.48550/arXiv.2404.04599.
- [12] Sitan Chen, Jerry Li, Brice Huang, and Allen Liu. Tight bounds for quantum state certification with incoherent measurements. In 2022 IEEE 63rd Annual Symposium on Foundations of Computer Science (FOCS), pages 1205–1213. IEEE, 2022. doi:10.1109/FOCS54457.2022.00118.
- [13] Eric Chitambar, Debbie Leung, Laura Mančinska, Maris Ozols, and Andreas Winter. Everything you always wanted to know about locc (but were afraid to ask). Communications in Mathematical Physics, 328:303–326, 2014.
- [14] Scott M Cohen. Understanding entanglement as resource: Locally distinguishing unextendible product bases. Physical Review A – Atomic, Molecular, and Optical Physics, 77(1):012304, 2008.
- [15] Jacob P Covey, Harald Weinfurter, and Hannes Bernien. Quantum networks with neutral atom processing nodes. npj Quantum Information, 9(1):90, 2023.
- [16] Andreas Elben, Benoît Vermersch, Rick van Bijnen, Christian Kokail, Tiff Brydges, Christine Maier, Manoj K Joshi, Rainer Blatt, Christian F Roos, and Peter Zoller. Cross-platform verification of intermediate scale quantum devices. Physical review letters, 124(1):010504, 2020.
- [17] Heng Fan. Distinguishability and indistinguishability by local operations and classical communication. Physical Review Letters, 92(17):177905, 2004.
- [18] Ranjani G Sundaram, Himanshu Gupta, and CR Ramakrishnan. Efficient distribution of quantum circuits. In 35th International Symposium on Distributed Computing (DISC 2021). Schloss Dagstuhl – Leibniz-Zentrum für Informatik, 2021.
- [19] Giovanni Guccione, Tom Darras, Hanna Le Jeannic, Varun B Verma, Sae Woo Nam, Adrien Cavaillès, and Julien Laurat. Connecting heterogeneous quantum networks by hybrid entanglement swapping. Science advances, 6(22):eaba4508, 2020.
- [20] Aram W Harrow. The church of the symmetric subspace. arXiv preprint, 2013. arXiv:1308.6595.
- [21] Marcel Hinsche, Marios Ioannou, Sofiene Jerbi, Lorenzo Leone, Jens Eisert, and Jose Carrasco. Efficient distributed inner product estimation via pauli sampling. arXiv preprint, 2024. arXiv:2405.06544.
- [22] Christopher Monroe, Robert Raussendorf, Alex Ruthven, Kenneth R Brown, Peter Maunz, L-M Duan, and Jungsang Kim. Large-scale modular quantum-computer architecture with atomic memory and photonic interconnects. Physical Review A, 89(2):022317, 2014.
- [23] Michael A Nielsen and Isaac L Chuang. Quantum computation and quantum information. Cambridge university press, 2010.
- [24] A Pirker, J Wallnöfer, and W Dür. Modular architectures for quantum networks. New Journal of Physics, 20(5):053054, 2018.
- [25] Pranab Sen. A quantum johnson-lindenstrauss lemma via unitary t-designs. arXiv preprint, 2018. arXiv:1807.08779.
- [26] Guifré Vidal and Rolf Tarrach. Robustness of entanglement. Physical Review A, 59(1):141, 1999.
- [27] Stephanie Wehner, David Elkouss, and Ronald Hanson. Quantum internet: A vision for the road ahead. Science, 362(6412):eaam9288, 2018.
- [28] Jun-Yi Wu, Kosuke Matsui, Tim Forrer, Akihito Soeda, Pablo Andrés-Martínez, Daniel Mills, Luciana Henaut, and Mio Murao. Entanglement-efficient bipartite-distributed quantum computing. Quantum, 7:1196, 2023. doi:10.22331/Q-2023-12-05-1196.
- [29] Zhi-Chao Zhang, Fei Gao, Tian-Qing Cao, Su-Juan Qin, and Qiao-Yan Wen. Entanglement as a resource to distinguish orthogonal product states. Scientific reports, 6(1):30493, 2016.