Directed st-Connectivity with Few Paths Is in Quantum Logspace
Abstract
We present a -procedure to count -paths on directed graphs for which we are promised that there are at most polynomially many paths starting in and polynomially many paths ending in . For comparison, the best known classical upper bound in this case just to decide -connectivity is . The result establishes a new relationship between and unambiguity and fewness subclasses of . Further, we also show how to recognize directed graphs with at most polynomially many paths between any two nodes in . This yields the first natural candidate for a language separating from and . Until now, all candidates potentially separating these classes were inherently promise problems.
Keywords and phrases:
Quantum computation, Space-bounded complexity classes, Graph connectivity, Unambiguous computation, Random walksFunding:
Simon Apers: EPIQ (ANR-22-PETQ-0007), QUDATA (ANR18-CE47-0010), QUOPS (ANR-22-CE47-0003-01) and HQI (ANR-22-PNCQ-0002), and EU project QOPT (QuantERA ERA-NET Cofund 2022-25).Copyright and License:
2012 ACM Subject Classification:
Theory of computation Graph algorithms analysis ; Theory of computation Quantum complexity theoryAcknowledgements:
We thank François Le Gall for discussions about the differences between language and promise classes. He made us aware that our results can be seen as first evidence that the language classes BQL and BPL are distinct. We further acknowledge useful discussions with Klaus-Jörn Lange and we thank Lior Eldar, Troy Lee and Ronald de Wolf for valuable comments on an earlier draft.Editors:
Srikanth SrinivasanSeries and Publisher:
Leibniz International Proceedings in Informatics, Schloss Dagstuhl – Leibniz-Zentrum für Informatik
1 Introduction and summary
Graph connectivity is a central problem in computational complexity theory, and it is of particular importance in the space-bounded setting. Given a graph and two vertices and , the task is to decide whether there is a path from to . For undirected graphs the problem is denoted as . Aleliunas, Karp, Lipton, Lovász and Rackoff [1] showed that doing a random walk for a polynomial number of steps can solve it in randomized logspace, . After a long line of work, Reingold [21] was able to derandomize the result and showed that the problem is already contained in deterministic logspace, , and is in fact complete for that class. In the directed graph setting the problem is denoted as , and it is complete for non-deterministic logspace, . The best known deterministic algorithm for in terms of space complexity is due to Savitch [23] and runs in space . We have the following well-known inclusions
where , introduced by Cook [7], is the class of languages that are Turing reducible to the computation of the determinant of an integer matrix and is the class of languages decidable in deterministic space . We refer to [4] for further details on reductions and basic complexity classes.
The most studied quantum space-bounded complexity class is bounded error quantum logspace, denoted . This is the class of languages decided in , i.e., decided by a quantum Turing machine with error running in space and time . The quantum Turing machine has read-only access to the input on a classical tape and can write on a uni-directional output tape which does not count towards the space complexity. The class lies in between and . In fact, it was recently shown by Fefferman and Remscrim [10] that certain restricted versions of the standard -complete matrix problems are complete for , where is the promise version of , i.e. the class of promise problems decided in . This extended the earlier work of Ta-Shma [24], who showed how to invert well-conditioned matrices in building on the original idea of Harrow, Hassidim and Lloyd [15]. We restate two of Ta-Shma’s main results:
-
1.
(Compare [24, Theorem 5.2]) Given a matrix with 111Throughout this paper, shall always denote the -norm of a vector or the spectral norm of a matrix., we can output all of its singular values and their respective multiplicities up to additive accuracy in . In particular, we can determine if all non-zero singular values have inverse polynomial distance from zero.
-
2.
(Compare [24, Theorem 1.1]) Given two indices and a matrix which is poly-conditioned, by this we mean that its singular values satisfy
we can estimate up to additive accuracy in .
The first result above directly implies a -procedure for deciding (alternatively, this clearly follows from the containment ). To see this, note that (i) can be reduced to counting the number of connected components, (ii) the dimension of the kernel of the random walk Laplacian is equal to the number of connected components, and (iii) for undirected graphs the spectral gap of , that is its smallest non-zero eigenvalue, is inverse polynomially bounded from zero. Here is the identity and is the transition matrix of a random walk. This ties to the fact that a random walk on an undirected graph takes polynomial time to traverse the graph (see e.g. [19, Chapter 12]). Unfortunately, for directed graphs the situation is more complicated. Importantly, the smallest non-zero singular value of the random walk Laplacian can be inverse exponentially small, and similarly the time it takes a random walk to find connected nodes can be exponential. Hence, it is not obvious how Ta-Shma’s results should be of any help in this setting.
Counting few paths
Somewhat surprisingly, we show that by analyzing a different matrix which we call the counting Laplacian we can use Ta-Shma’s second result to solve instances of in that seem hard classically. Here denotes the adjacency matrix of a graph. While the random walk Laplacian is spectrally well-behaved if a random walk is efficient, we find that the counting Laplacian is spectrally well-behaved if the underlying graph is acyclic and contains only few paths. We remark that the number of paths in a graph can be totally unrelated to the success probability of a random walk finding specific nodes. Even if there exist very few paths, it can happen that a random walk has an extreme bias to only pick paths we are not interested in. Consider for instance the following graph:
The number of paths between any two nodes is at most one. Nonetheless, a random walk starting at node only has probability to reach node .
Given a directed graph with nodes let us denote by the number of paths from to . By a path from to we mean a sequence of edges which joins a sequence of nodes such that , and for all .222Some authors call this a walk and disallow a path to visit any vertex more than once. We follow [3, 17] in our definition. By convention we also count the empty sequence as a path from any node to itself such that for all . As our first result, and as a primer for the rest of the paper, we show that we can count the number of -paths on directed graphs for which there are at most polynomially many paths between any two nodes in . In particular, this allows to decide on such graphs.
Theorem 1.
Fix a polynomial . Let be a directed graph with nodes such that
-
.
There is an algorithm running in that, given access to the adjacency matrix of and , returns the number of paths from to .
Proof.
First of all, observe that the finite path bound between any two nodes implies that the graph is in particular acyclic. Second, note that is equal to the number of paths of length from node to node . Both in mind, it follows that , i.e. is nilpotent. As a consequence we obtain that the inverse of the counting Laplacian exists and is equal to
Clearly, its entries simply count the total number of paths from to , i.e. . Crucially, we find that the polynomial bound on the number of paths ensures that the matrix is poly-conditioned. Observe that the -norm of a matrix, i.e. its maximum entry in absolute value, can be used to bound its spectral norm. More precisely, we have that for any matrix . Using that and , we thus find bounds for the largest and smallest singular value of ,
Hence, the counting Laplacian is poly-conditioned and we can apply Ta-Shma’s matrix inversion algorithm, the second restated result above, to approximate entry up to additive error in . Rounding to the closest integer gives the number of paths from to .
The proof of Theorem 1 uses a reduction of summing matrix powers to matrix inversion. The idea for this is well-known, and appeared in this context in early work by Cook [7], and more recently by Fefferman and Remscrim [10]. However, they did not study the implications to the space complexity of .
In Section 4 we push the algorithmic idea of Theorem 1 further by doing a more fine-grained analysis of the counting Laplacian’s singular values and singular vectors. We show that we can already count -paths in on directed graphs for which only the number of paths starting from and the number of paths ending in are polynomially bounded. We state the formal result here.
Theorem 2.
Fix a polynomial . Let be a directed graph with nodes such that
-
and .
There is an algorithm running in that, given access to the adjacency matrix of and , returns the number of paths from to .
Classically (deterministically or randomly), the best known space bound just to decide on graphs promised to satisfy a polynomial bound on the number of paths between any two nodes as in Theorem 1 or only on the number of paths starting from and on the number of paths ending in as in Theorem 2 is [3, 12]. Alternatively, as noticed in [6, 18] we can also solve such instances simultaneously in deterministic polynomial time and space . We elaborate on these bounds in the next section.
Unambiguity, Fewness and a language in BQL (maybe) not in L
Previous works studied restrictions on the path count in connection to “unambiguity” and “fewness” of configuration graphs of space-bounded Turing machines. These notions were introduced to interpolate between determinism and non-determinism, and gives rise to complexity classes between and . We formally introduce these classes in Section 2. As a direct consequence of Theorem 1 we obtain:
Corollary 3.
where denotes the class of languages which are decidable by an -Turing machine whose configuration graphs for all inputs are strongly-few, that is graphs for which there are at most polynomially many paths between any two nodes. By some preprocessing in the algorithm of Theorem 1 we can actually check in whether a given graph is strongly-few.333Unfortunately, we see no way to do the same for the weaker promise of Theorem 2. We obtain the subsequent language containment (notably, the containment of this language in is not known).
Theorem 4.
The language
is contained in .
This seems to be the first concrete example of a language in not known to lie in or . As far as we are aware, before this work only promise problems were known that lie in but which are potentially not contained in [24, 9, 10, 11].
We now summarize briefly what is known classically. A language similar to , namely
has been studied before. It was first introduced by Lange [18] who showed that it is complete for , which is the class of languages decidable by an -Turing machine whose configuration graphs for all inputs are reach-unambiguous, meaning that there is a unique computation path from the start configuration to any reachable configuration.444Note that the -hardness of is trivial but the completeness is not. This is because the uniqueness in the definition of the complexity class is used as a restriction on the machine, while it is used as an acceptance criterion in the definition of the language. Further, it was noticed in [18, 6] that is contained in , which is the class of languages decidable simulatenously in deterministic polynomial time and space . Additionally, Allender and Lange [3] found that on graphs promised to be reach-unambiguous is solvable in deterministic space implying . In particular, these results put in and in . Also, more recently Garvin, Stolee, Tewari and Vinodchandran [12] proved that is equal to , where is the class of languages decidable by an -Turing machine whose configuration graphs for all inputs are reach-few, i.e. they have at most polynomially many computation paths from its start configuration to any reachable configuration. We thus have
Notably, while [12] implies a procedure to solve on graphs promised to be reach-few in (in particular, this includes the graphs from Theorems 1 and 2), this does not allow to verify whether a general graph satisfies this promise. Indeed, none of the upper bounds for directly carry over to , for which the best classical space bound to date seems to be .
Conclusion and open questions
Summarizing, we show that in quantum logspace we can count -paths on graphs for which even solving -connectivity is not known to be possible in classical (deterministic or randomized) logspace. Further, we obtain the first language in not known to lie in or . Our work also yields a number of open questions.
An obvious first question is whether really separates and . A first step towards answering this might be tackling the related question, whether we can carry over some of the known upper bounds for to . That is, is also contained in or in ? Note that the known -complete problems are not known to satisfy these upper bounds [24, 9, 10, 11].
Further, we wonder whether it is possible to improve the space bound by Allender and Lange. In fact, Allender recently asked this in an article [2] in which he reflects on some open problems he encountered throughout his career. Allender suspects that for the restricted case of strongly-unambiguous graphs, also called mangroves, for which the number of paths between any two nodes is bounded by one, there should exist an algorithm deciding running in deterministic space . He even offers a $1000 reward for any improvement of their space bound, already for this restricted case. A dequantization of our results would thus yield some good pocket money.555Even if the dequantization were randomized, i.e. in , it would still imply a bound by the inclusion due to Saks and Zhou [22] which has recently been slightly improved on by Hoza [16].
Another natural question is whether in we can solve on a larger class of graphs such as reach-few ones, where only the number of paths from is polynomially bounded. This relaxes our promise in Theorem 2. Unfortunately, our current approach of using an effective pseudoinverse seems to require our stronger promise. More generally, we feel that a better understanding of the singular values and vectors of directed graph matrices will yield further insights into the utility of quantum space-bounded computation for solving problems on directed graphs.
We further believe it would be interesting to investigate whether there is a quantum algorithm running simultaneously in polynomial time and truly sublinear space for some deciding on general graphs. Note that the best known classical algorithm for deciding on general graphs and running in polynomial time needs almost linear space as described in [5].
Finally, the link between poly-conditionedness and bounds on the path count raises the question of whether some variation of could be proven complete for .
2 Space-bounded computation
In Section 2.1 we introduce the Turing machine model of space-bounded computation and define the most important appearing complexity classes. We mainly follow the definitions from Ta-Shma [24] and refer to [10, Section 2.2] for a discussion on the equivalence of the quantum Turing machine model and the quantum circuit model. In Section 2.2 we mention some complete problems of promise versions of the defined complexity classes.
2.1 Turing machines
A deterministic space-bounded Turing machine (DTM) acts according to a transition function on three semi-infinite tapes: A read-only tape where the input is stored, a read-and-write work tape and a uni-directional write-only tape for the output. The TMs computation time is defined as the number of transition steps it performs on an input, and its computation space is the number of used cells on the work tape, i.e. we do not count the number of cells on the input or output tape towards its computation space. DTMs with space-bound for inputs of length give rise to . We define as the class of languages decided in and as the class of languages decided in .
A non-deterministic Turing machine (NTM) is similar to a DTM except that it has two transition functions and . At each step in time the machine non-deterministically chooses to apply either one of the two. It is said to accept an input if there is a sequence of these choices so that it reaches an accepting configuration and it is said to reject the input if there is no such sequence of choices. We obtain . Further, is the class of languages decided in .
A probabilistic space-bounded Turing machine (PTM) is again similar to a DTM but with the additional ability to toss random coins. This can be conveniently formulated by a fourth tape that is uni-directional, read-only and initialized with uniformly random bits at the start of the computation. It does not count towards the space. A language is said to be decided in if there is a PTM running in space and time666The time bound does not follow from the space-bound and is equivalent to demanding that the TM absolutely halts for all possible assignments of the random coins tape. deciding it with completeness error and soundness error , that is every input in the language is accepted with probability at least and every input not in the language is accepted with probability at most . Also, we write for and for . Further, is the class of languages decided in and is the class of languages decided in .
A quantum space-bounded Turing machine (QTM) is a DTM with a fourth tape for quantum operations instead of a random coins tape. The transition function is still classically described. The tape cells of the quantum tape are qubits and initialized in state at the start of the computation. There are two tape heads moving in both directions on the quantum tape. At each step during the computation, the machine can apply a gate from some universal gate set, say , or perform a measurement to a projection in the standard basis to the qubits below its tape heads. The measurement outcomes are communicated to the machine and can therefore control later steps of the computation. In particular, the machine can reset qubits to their initial state. The used cells on the quantum tape count towards the computation space. As before, we say a language is decided in if there is a QTM running in space and time deciding it with completeness error and soundness error . Also, we mean by if not mentioned otherwise. Finally, is the class of languages decided in . The particular choice of the universal gate set does not affect the resulting complexity class due to the space-efficient version of the Solovay-Kitaev theorem of van Melkebeek and Watson [20]. The same applies to disallowing intermediate measurements, thanks to the space-efficient “deferred measurement principle” proven by Fefferman and Remscrim [10] building on the earlier work of Fefferman and Lin [9] (see also [14, 13] for an alternative time- and space-efficient version of this principle which applies to a special type of intermediate measurements that cannot control later computations). Also, the chosen success probability of can be amplified by sequentially repeating computations.
2.2 Complete (promise) problems
In this work we only consider language classes. In particular, we present the first candidate to distinguish and . Note that candidates for distinguishing the promise versions of these classes, and , are well-known. As mentioned in the introduction, Fefferman and Remscrim [10] showed that well-conditioned promise versions of all the standard -complete matrix problems are complete for . Let us highlight that matrix powering is one of these problems. Restricted to stochastic matrices it is easily seen to be complete for , and restricted to matrices for which the largest singular values of its powers grow at most polynomially, it is complete for . Indeed, this seems to indicate that powering the adjacency matrix of a graph, to which our approach in Theorem 1 essentially boils down to, rather than powering the corresponding random walk matrix, truly exploits a quantum advantage. A similar distinction of and is expected from the approximation of the spectral gap of matrices. Doron, Sarid and Ta-Shma [8] showed that a promise decision version of this problem is -complete for stochastic matrices while it is -complete for general Hermitian matrices. More recently, Le Gall, Liu and Wang [11] presented another group of -complete problems based on state testing.
3 Fewness language in BQL
In Section 3.1 we introduce the notions of unambiguity and fewness in space-bounded computation. In Section 3.2 we prove Theorem 4 presenting a language in not known to lie in or .
3.1 Unambiguity and fewness
The computation of a Turing machine can be viewed as a directed graph on configurations, and certain restrictions on the Turing machine translate to natural restrictions on the corresponding configuration graph. The notions of “unambiguity” and “fewness” of a Turing machine relate to the following graph-theoretic notions.
Definition 5.
Let be a directed graph and let be an integer. Then is called
-
-unambiguous with respect to nodes if ,
-
-reach-unambiguous with respect to node if for all ,
-
-strongly unambiguous if for all .
In the case of , we simply say is unambiguous, reach-unambiguous or strongly unambiguous, respectively. Furthermore, a family of directed graphs is called few-unambiguous, reach-few or strongly-few if there exists a polynomial such that each of the graphs from the family with nodes is -unambiguous, -reach-unambiguous or -strongly unambiguous, respectively.
Consider the following examples of the above definition due to Lange [18]:
The left graph is unambiguous with respect to nodes and but not reach-unambiguous with respect to node , the middle one is reach-unambiguous with respect to node but not strongly unambiguous and the right one is strongly unambiguous.
These notions of unambiguity and fewness naturally give rise to six complexity classes between and . We follow the original paper of Buntrock, Jenner, Lange and Rossmanith [6] and define strongly-unambiguous logspace, , strongly-few logspace, , reach-unambiguous logspace, , reach-few logspace, , unambiguous logspace, , and few logspace, as the classes of languages that are decidable by an -Turing machine with unique accepting configuration whose family of configuration graphs for inputs , , satisfies the corresponding unambiguity or fewness restriction with respect to its starting and its accepting configuration.
Putting this together with the trivial containments and the previously mentioned results in [6, 18, 3, 12], we obtain the following inclusion diagram to read from left to right:
3.2 Proof of Theorem 4
Observe that Theorem 1 only shows that we can decide -connectivity on directed graphs that are promised to be strongly-few. We now show that we can also check whether this promise holds in , i.e. we obtain a language containment. We restate the result mentioned in the introduction: See 4
The idea for proving the above theorem is to use Ta-Shma’s spectrum approximation procedure to estimate the smallest singular value of the counting Laplacian . In case the graph is acyclic and the smallest singular value is below some threshold, this gives us a lower bound for , the maximum number of paths, so that we can correctly reject graphs with too many paths. In case it is higher than the threshold, we know that is poly-conditioned and we can proceed as in Theorem 1 to compute the number of paths between any pair of nodes exactly. However, in order for this approach to work, it is crucial that the graph is acyclic. Otherwise, the smallest singular value of need not be related to the number of paths at all. We ensure this by first mapping the input graph to a layered graph that is guaranteed to be acyclic, similar as in [12]. We give the following definition.
Definition 6.
Let be a directed graph with vertices. We define the layered graph on the vertex set with two types of edges:
-
1.
For all edges and all add an edge from to in ,
-
2.
for all and all add an edge from to in .
It is easy to see that the paths in the first layers of directly correspond to paths of length less than in . The last layer in just serves as a catch basin for all paths of different lengths. Let us quickly remark that counting paths in also allows us to detect cycles in . To see this, note that there is a cycle in through a node if and only if in . With this in mind, let us now prove the above theorem.
Proof of Theorem 4.
Let be a given input graph instance with nodes. Without loss of generality assume that for some fixed polynomial . We first construct which is acyclic. Note that this is possible in . We consider the counting Laplacian of and run Ta-Shma’s spectrum approximation algorithm (compare [24, Theorem 5.2]) to approximate its singular values with error and accuracy . If we obtain a singular value smaller than , then we have with probability at least ,
which implies . In this case we reject the input. Otherwise, if we do not obtain a singular value smaller than , then we know with the same probability that the counting Laplacian of is poly-conditioned. Thus, we can proceed as in Theorem 1 and run Ta-Shma’s matrix inversion algorithm to determine all entries of with total error and accuracy . For all we check in this way whether . If this is the case for some , then there is a cycle in containing , i.e. in , and we reject the input. Otherwise, we further check whether all entries of are upper bounded by and if . The former implies for all , and the latter implies in . If both conditions are satisfied, we accept the input. Otherwise, we reject it. The total error probability of the algorithm is no higher than .
4 Counting few paths in quantum logspace
In this section we show how to push the algorithmic idea behind Theorem 1 to obtain Theorem 2, which shows how to count -paths on graphs with a polynomial bound on the number of paths leaving , and on the number of paths arriving in , in . For this, we need the notion of an effective pseudoinverse, which we introduce in Section 4.1. The proof of Theorem 2 is in Section 4.2.
4.1 Effective pseudoinverse
A close look at Ta-Shma’s matrix inversion algorithm shows that it can be easily altered to also handle ill-conditioned matrices as input and only invert them on their well-conditioned part. In order to appropriately state this observation we make the following definition.
Definition 7 (Effective pseudoinverse).
Let be an matrix with singular value decomposition . For we define the -effective pseudoinverse of as the matrix
Note that in the definition we essentially drop the largest terms of the actual inverse . While this produces significant error to approximate as a whole, we find that it can still give a good approximation for some relevant entries. We now state the refined version of Ta-Shma’s matrix inversion algorithm which allows us to compute effective pseudoinverses of general matrices.
Theorem 8.
Fix and . Let be an matrix such that . There is an algorithm running in that given and two indices outputs with probability an -additive approximation of the entry , where is a random value that is fixed at the beginning of the computation and is -close to .
While it is a simple modification of [24], for completeness we provide a proof of this theorem in Appendix A. The fact that we cannot control the exact threshold of which singular values should be ignored during the effective pseudoinversion is a consequence of the inaccuracy of quantum phase estimation. This inaccuracy is limited by using Ta-Shma’s consistent phase estimation procedure.
4.2 Proof of Theorem 2
We now have the necessary tools to prove our final result which we recall here: See 2 The idea for the proof is to approximate the effective pseudoinverse entry of the counting Laplacian for some small enough instead of the actual inverse entry . While ignoring the smallest singular values during the effective pseudoinversion normally leaves out the largest terms, we find that our path bounds imply low overlap of and for small singular values such that entry is close to .
Proof.
Without loss of generality we assume the graph to be acyclic. Otherwise, we proceed as in Section 3.2 and first map it to which is guaranteed to be acyclic. Now consider the counting Laplacian and its singular value decomposition . Its inverse is . Further, consider the vectors and . They contain as entries the number of paths starting in and the number of paths ending in , respectively. Hence, we find for their squared -norms:
where the last equalities of both lines follow because the and are orthonormal bases. As a consequence we obtain for each
Combining the two we find as a bound for the -th term of the singular value decomposition of ,
This allows us to estimate the error in computing an effective pseudoinverse entry instead of the actual inverse entry . In fact, for we have
Choosing , and in Theorem 8 ensures and yields an additive approximation of within the desired space complexity. Rounding to the closest integer gives the number of paths from to .
A natural open question is whether the simultaneous polynomial bound on (i) the number of paths starting from and on (ii) the number of paths ending in is really necessary for a procedure. Unfortunately, at least with our approach above, this seems to be the case. Note that (i) implies low overlap of with the left singular vectors of and (ii) implies low overlap of with the right singular vectors of . It turns out that if only one of the two is small, then the contribution of to can still be significant for very small but will be ignored in the pseudoinversion.
References
- [1] Romas Aleliunas, Richard M. Karp, Richard J. Lipton, Laszlo Lovasz, and Charles Rackoff. Random walks, universal traversal sequences, and the complexity of maze problems. In 20th Annual Symposium on Foundations of Computer Science, pages 218–223, 1979. doi:10.1109/SFCS.1979.34.
- [2] Eric Allender. Guest column: Parting thoughts and parting shots (read on for details on how to win valuable prizes! SIGACT News, 54(1):63–81, March 2023. doi:10.1145/3586165.3586175.
- [3] Eric Allender and klaus-joern Lange. . Theory of Computing Systems, 31, October 1998. doi:10.1007/s002240000102.
- [4] Sanjeev Arora and Boaz Barak. Computational Complexity: A Modern Approach. Cambridge University Press, USA, 1st edition, 2009.
- [5] Greg Barnes, Jonathan F. Buss, Walter L. Ruzzo, and Baruch Schieber. A sublinear space, polynomial time algorithm for directed s-t connectivity. SIAM Journal on Computing, 27(5):1273–1282, 1998. doi:10.1137/S0097539793283151.
- [6] Gerhard Buntrock, Birgit Jenner, Klaus-Jörn Lange, and Peter Rossmanith. Unambiguity and fewness for logarithmic space. In Proceedings of the 8th International Symposium on Fundamentals of Computation Theory, FCT ’91, pages 168–179, Berlin, Heidelberg, 1991. Springer-Verlag. doi:10.1007/3-540-54458-5_61.
- [7] Stephen A. Cook. A taxonomy of problems with fast parallel algorithms. Information and Control, 64(1):2–22, 1985. International Conference on Foundations of Computation Theory. doi:10.1016/S0019-9958(85)80041-3.
- [8] Dean Doron, Amir Sarid, and Amnon Ta-Shma. On approximating the eigenvalues of stochastic matrices in probabilistic logspace. Comput. Complex., 26(2):393–420, June 2017. doi:10.1007/s00037-016-0150-y.
- [9] Bill Fefferman and Cedric Yen-Yu Lin. A Complete Characterization of Unitary Quantum Space. In Anna R. Karlin, editor, 9th Innovations in Theoretical Computer Science Conference (ITCS 2018), volume 94 of Leibniz International Proceedings in Informatics (LIPIcs), pages 4:1–4:21, Dagstuhl, Germany, 2018. Schloss Dagstuhl – Leibniz-Zentrum für Informatik. doi:10.4230/LIPIcs.ITCS.2018.4.
- [10] Bill Fefferman and Zachary Remscrim. Eliminating intermediate measurements in space-bounded quantum computation. In Proceedings of the 53rd Annual ACM SIGACT Symposium on Theory of Computing, STOC ’21, pages 1343–1356. ACM, June 2021. doi:10.1145/3406325.3451051.
- [11] François Le Gall, Yupan Liu, and Qisheng Wang. Space-bounded quantum state testing via space-efficient quantum singular value transformation, 2024. doi:10.48550/arXiv.2308.05079.
- [12] Brady Garvin, Derrick Stolee, Raghunath Tewari, and N. Vinodchandran. Reachfewl = reachul. Electronic Colloquium on Computational Complexity (ECCC), 18:60, August 2011. doi:10.1007/s00037-012-0050-8.
- [13] Uma Girish and Ran Raz. Eliminating intermediate measurements using pseudorandom generators, 2021. arXiv:2106.11877.
- [14] Uma Girish, Ran Raz, and Wei Zhan. Quantum Logspace Algorithm for Powering Matrices with Bounded Norm. In Nikhil Bansal, Emanuela Merelli, and James Worrell, editors, 48th International Colloquium on Automata, Languages, and Programming (ICALP 2021), volume 198 of Leibniz International Proceedings in Informatics (LIPIcs), pages 73:1–73:20, Dagstuhl, Germany, 2021. Schloss Dagstuhl – Leibniz-Zentrum für Informatik. doi:10.4230/LIPIcs.ICALP.2021.73.
- [15] Aram W. Harrow, Avinatan Hassidim, and Seth Lloyd. Quantum algorithm for linear systems of equations. Physical Review Letters, 103(15), October 2009. doi:10.1103/physrevlett.103.150502.
- [16] William M. Hoza. Better Pseudodistributions and Derandomization for Space-Bounded Computation. In Mary Wootters and Laura Sanità, editors, Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques (APPROX/RANDOM 2021), volume 207 of Leibniz International Proceedings in Informatics (LIPIcs), pages 28:1–28:23, Dagstuhl, Germany, 2021. Schloss Dagstuhl – Leibniz-Zentrum für Informatik. doi:10.4230/LIPIcs.APPROX/RANDOM.2021.28.
- [17] Sampath Kannan, Sanjeev Khanna, and Sudeepa Roy. Stcon in directed unique-path graphs. In FSTTCS, pages 256–267, 2008. doi:10.4230/LIPIcs.FSTTCS.2008.1758.
- [18] Klaus-Jörn Lange. An unambiguous class possessing a complete set. In Proceedings of the 14th Annual Symposium on Theoretical Aspects of Computer Science, STACS ’97, pages 339–350, Berlin, Heidelberg, 1997. Springer-Verlag. doi:10.1007/BFB0023471.
- [19] D.A. Levin, Y. Peres, and E.L. Wilmer. Markov Chains and Mixing Times. American Mathematical Soc., 2008. URL: http://pages.uoregon.edu/dlevin/MARKOV/.
- [20] Dieter van Melkebeek and Thomas Watson. Time-space efficient simulations of quantum computations. Theory of Computing, 8(1):1–51, 2012. doi:10.4086/toc.2012.v008a001.
- [21] Omer Reingold. Undirected connectivity in log-space. J. ACM, 55(4), September 2008. doi:10.1145/1391289.1391291.
- [22] Michael Saks and Shiyu Zhou. . Journal of Computer and System Sciences, 58(2):376–403, 1999. doi:10.1006/jcss.1998.1616.
- [23] Walter J. Savitch. Relationships between nondeterministic and deterministic tape complexities. Journal of Computer and System Sciences, 4(2):177–192, 1970. doi:10.1016/S0022-0000(70)80006-X.
- [24] Amnon Ta-Shma. Inverting well conditioned matrices in quantum logspace. In Proceedings of the Forty-Fifth Annual ACM Symposium on Theory of Computing, STOC ’13, pages 881–890, New York, NY, USA, 2013. Association for Computing Machinery. doi:10.1145/2488608.2488720.
Appendix A Effective pseudoinversion in quantum logspace
The algorithm for the effective pseudoinversion is essentially identical to Ta-Shma’s matrix inversion procedure except for a small change in the rotation step to appropriately treat ill-conditioned matrices. For completeness we describe it here but refer to [24] for the detailed complexity and error analysis.
Proof sketch of Theorem 8..
We make the following two simplifying assumptions:
-
Without loss of generality we assume that . Otherwise, we simply choose as an upper bound for and rescale the matrix with factor . Approximating the entries of a -effective pseudoinverse of this rescaled matrix up to accuracy gives an approximation of the entries of a -effective pseudoinverse of within the same space complexity.
-
Furthermore, we assume the matrix to be Hermitian. Otherwise we use the well-known reduction to the Hermitian case
It is easily verified that the eigenpairs of are given by , where and denote the singular values and vectors of , respectively. We then find .
Assuming the above, let the spectral decomposition of the matrix be given by and let . The algorithm works on four registers: An input register , an estimation register , a shift register and an ancillary register of dimension at least three.
-
1.
We start by preparing the initial state
-
2.
We then apply the consistent phase estimation procedure (compare [24, Section 5.2]) to the input, estimation and shift register and obtain a state close to
where is the j-th section number, that is a fixed classical value depending on only, from which we can recover a -approximation of the eigenvalue .
-
3.
We next approximately apply a unitary map acting on the shift and ancillary register partially described by
-
4.
We reverse the consistent phase estimation and are left with a state close to
Note that the approximations of the eigenvalues are monotone in the sense that implies . From this we get the existence of and , both in absolute value -close to , such that . Choosing and combining symmetric shifts for the positive and negative eigenvalues during the consistent phase estimation allows to assume . Denoting this value by we find .
-
5.
Finally, we measure the ancillary register. If the measurement outcome is , this leaves us with a state close to the normalized desired one . In fact, estimating the success-probability of this measurement outcome gives a good approximation of
from which we recover the norm .
Repeating the steps above sufficiently many times lets us create multiple copies of the final state close to . We then use Ta-Shma’s space-efficient tomography procedure [24, Theorem 6.1] to approximately learn the state, and in particular entry .
