Hidden Matching Problem

The Hidden Matching Problem is a computation complexity problem that can be solved using quantum protocols: Let be a positive even integer. In the Hidden Matching Problem, Alice is given and Bob is given ( denotes the family of all possible perfect matchings on nodes). Their goal is to output a tuple such that the edge belongs to the matching and .[1]

It has been used to find quantum communication problems that demonstrate super-polynomial advantage of over classical ones.[1][2][3]

Background

edit

Communication complexity is a model of computation first introduced by Yao in 1979.[4] Two parties (normally called Alice and Bob) each hold a piece of data and want to solve some computational task that jointly depends on their data.[3] Alice knows only information   and Bob knows only information  , and they want to solve some function  . In order to do so, they will need to communicate between themselves, and their goal is to solve the problem with minimal communication obeying the restrictions of a specific communication model.

There are two key communication models that can be considered:[2]

  • One-way communication is the model where Alice sends a single message to Bob who has to give an answer, based on the content of the message and his part of input.
  • Interactive (two-way) communication is the model where the players can interactively exchange messages till Bob decides to give an answer, based on the communication transcript and his part of input.

Communication tasks can be either functional, meaning that there is exactly one correct answer corresponding to every possible input, or relational, when multiple correct answers are allowed.[2]

History

edit

The Hidden Matching Problem was first defined in 2004 by Bar-Yossef, Jayram and Kerenidis.[1] Through its definition, they were able to provide the first exponential separation between quantum and bounded-error randomized one-way communication complexity. They proved that the quantum one-way communication complexity of the Hidden Matching Problem is  , yet any randomized one-way protocol with bounded error must use   bits of communication. The Hidden Matching Problem is a relational problem.

Alice sends a superposition   to Bob. Bob uses his perfect matching to project this quantum state onto one of n/2 orthogonal 2D projectors, with a projector onto the space spanned by   for pairing of i and j. After measurement, the quantum state is specified by the measured projector. The bit b determines whether the resulting state is  .

With a classical message, Alice has to send on order of   bits of information specifying the value of x for that many nodes. By the birthday problem, the probability is close to 1 that at least two nodes in that subset are connected by an edge.

In the same paper, the authors proposed a Boolean version of the problem, the Boolean Hidden Matching problem, and conjectured that the same quantum-classical gap holds for it as well.[1] This was later proven to be true by Gavinsky et al.[5]

In 2008, Gavinsky further improved on Bar-Yossef et al.’s result by showing an exponential separation between one-way quantum communication and two-way classical communication.[2]

Applications

edit

The Hidden Matching Problem was used as the basis of Gavinsky's 2012 Quantum Coin Scheme.[6] Bob has been given a coin as payment for some goods or services. This coin consists of a quantum register containing multiple qubits. Bob wishes to verify that the coin is legitimate.

In a classical scenario, a digital coin is made up of a unique string of classical bits, a coin holder sends this string to the bank and the bank compares it to a static database of valid strings. If the string exists in the database then the bank confirms that the coin is valid. However, this leaves the potential for an adversary to masquerade as the bank and steal a coin holder's coin under the pretence of verifying it.

Using the Hidden matching problem, the coin holder can send the relevant information to the bank and the bank can verify that the coin is legitimate but an adversary masquerading as a bank will not learn enough to be able to reproduce the coin.

In the protocol Bob will provide  values   to the bank. These values   are attained by Bob measuring certain quantum registers in his coin. The bank holds the values   (the classical bit strings) and  . If  , then the bank can verify that Bob does in fact hold a valid coin corresponding to the classical values  .

For   and  , we say that   if

 

  refers to the four bit version of the Hidden Matching Problem.

References

edit
  1. ^ a b c d Bar-Yossef, Ziv; Jayram, T. S.; Kerenidis, Iordanis (2004-06-13). "Exponential separation of quantum and classical one-way communication complexity". Proceedings of the thirty-sixth annual ACM symposium on Theory of computing. STOC '04. Chicago, IL, USA: Association for Computing Machinery. pp. 128–137. doi:10.1145/1007352.1007379. ISBN 978-1-58113-852-8. S2CID 557748.
  2. ^ a b c d Gavinsky, Dmitry (2008-05-17). "Classical interaction cannot replace a quantum message". Proceedings of the fortieth annual ACM symposium on Theory of computing. STOC '08. Victoria, British Columbia, Canada: Association for Computing Machinery. pp. 95–102. doi:10.1145/1374376.1374393. ISBN 978-1-60558-047-0. S2CID 6659329.
  3. ^ a b Doriguello, João F. (2020). "Exponential quantum communication reductions from generalizations of the Boolean Hidden Matching problem" (PDF). 15th Conference on the Theory of Quantum Computation, Communication and Cryptography (TQC 2020). Leibniz International Proceedings in Informatics (LIPIcs). 158: 1:1–1:16. arXiv:2001.05553. doi:10.4230/LIPIcs.TQC.2020.1. ISBN 9783959771467. S2CID 210701354.
  4. ^ Yao, Andrew Chi-Chih (1979-04-30). "Some complexity questions related to distributive computing(Preliminary Report)". Proceedings of the eleventh annual ACM symposium on Theory of computing - STOC '79. Atlanta, Georgia, USA: Association for Computing Machinery. pp. 209–213. doi:10.1145/800135.804414. ISBN 978-1-4503-7438-5. S2CID 999287.
  5. ^ Gavinsky, Dmitry; Kempe, Julia; Kerenidis, Iordanis; Raz, Ran; de Wolf, Ronald (2007-06-11). "Exponential separations for one-way quantum communication complexity, with applications to cryptography". Proceedings of the thirty-ninth annual ACM symposium on Theory of computing. STOC '07. San Diego, California, USA: Association for Computing Machinery. pp. 516–525. doi:10.1145/1250790.1250866. ISBN 978-1-59593-631-8. S2CID 444057.
  6. ^ Gavinsky, D. (June 2012). "Quantum Money with Classical Verification". 2012 IEEE 27th Conference on Computational Complexity. pp. 42–52. arXiv:1109.0372. doi:10.1109/CCC.2012.10. ISBN 978-0-7695-4708-4. S2CID 11673644.