Playing (quantum) games with operator spaces

1 / 37

# Playing (quantum) games with operator spaces - PowerPoint PPT Presentation

Playing (quantum) games with operator spaces. David Pérez-García Universidad Complutense de Madrid Bilbao 8-Oct-2011. Our group. 2 postdoctoral research positions opened in our group “Mathematics and Quantum Information ”. Structure of the talk. The object under study: 2P1R games

I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.

## PowerPoint Slideshow about 'Playing (quantum) games with operator spaces' - harper

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.

- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript

### Playing (quantum) gameswithoperatorspaces

David Pérez-García

Bilbao 8-Oct-2011

Ourgroup
• 2 postdoctoral research positions opened in ourgroup “Mathematics and Quantum Information”.
Structure of the talk
• The object under study: 2P1R games
• Examples. Why are they important?
• Complexity theory I. Inaproximability results.
• Complexity theory II. Parallel computation.
• Position based cryptography.
• Certifiable random number generation.
• A bit (just one bit!) of history.
• Where are the maths?
• Our contribution. Operator Spaces.

### 2P1R games

2P1R games

A set of possible questions for Alice and Bob (denoted by x,yresp.).

A known probability distribution for the questions.

A known boolean function V(x,y,a,b) which decides, based on questions and answers a,b, whether they witn (=1) or loose (=0) the game.

A limitation in the communication between Alice and Bob.

y

x

b

a

2P1R games

The value of the game is the largest probability of wining the game while optimizing over the possible strategies of Alice and Bob.

It is assumed that Alice and Bob have free communication BEFORE the game to coordinate an strategy .

Hence strategies can involve shared randomness (classical value of the game) or quantum entanglement(quantum value of the game) depending on the resources of Alice and Bob.

y

x

b

a

2P1R games

What is an strategy?

A probability distribution p(ab|xy)

Which are the possible strategies in the classical case?

x

y

b

a

And in the quantum one?

### EXAMPLES. Inaproximability

examples. Inaproximability results

Theorem(PCP theorem (Arora-Safra, 92)+ Parallel repetition (Raz, 94)):

Unless P=NP, given e>0 and a polynomial algorithm to determine the classical value of a game, there exist games for which the value is 1 and the algorithm outputs a value <e.

e

0

1

Examples. Inaproximability results

It is the mother of most inaproximability results. For instance:

Unless P=NP, given e>0 and a polynomial algorithm to determine the MAX-CLIQUE of a graph, there exist graphs of n vertices for which

Note that MAX-CLIQUE is always less or equal than n (!!)

Examples. Inaproximability results

Connection with 2P1R games. Via LABEL-COVER.

Given a bipartite graph

And a set of colors

And a set of valid configurations for each edge

Find a coloring of the graph which maximizes the number of edges with a valid configuration.

Examples. Inaproximability results

Connection with 2P1R games. Via LABEL-COVER.

Colors

Number of valid edges = 4

Solution to LABEL-COVER = 5

Examples. Inaproximability results

Connection with 2P1R games. Via LABEL-COVER.

Given and instance of LABEL-COVER, we define a 2P1R game by:

Questions = vertices (from U to Alice and from W to Bob) with uniform probability between the pairs which conform an edge (and 0 in the rest).

They win the game if they give a valid coloring for the edge which is asked.

### Examples. Parallel computation

Examples. Parallel computation

Given a boolean function f(x,y), minimize c in:

x

y

c bits of communication

f(x,y)

f(x,y)

### Examples. Position based cryptography.(chandran et al, 2009)

Examples.Position based cryptography

1D for simplicity

Position P

x

y

b

a

Coordinated

AIM: That only someone in position P could answer with probability 1 to the challenge. It would allow unconditional secure communication !!!

Examples.Position based cryptography

Relation with 2P1R games. Since the verifiers act coordinated, we can assume there is just one of them.

Based on answering times, we have:

y

x

b

a

Communication “independent-one-way”

Examples.Position based cryptography

Hence, the aim is to find a challenge which can be won always with arbitrary communication (all classical challenges are like that) but not with “independent-one-way” communication.

y

x

The honest case is the one of arbitrary communication, since there is only a single prover.

a

b

Examples.Position based cryptography

This is impossible classically. Both models of communication are the same. To see it, just copy and send the received question.

In the quantum case (with no entanglement) it is indeed possible (Buhrman et al., 2010). The key idea lies on the fact that it is NOT possible to copy quantum states by the NO-CLONING theorem.

Question: Is it also possible when a polynomial amount of entanglement is allowed?

Partial answers (Beigi et al., Burhman et al, 2011):

LINEAR = YES, EXPONENTIAL = NO.

### Examples. Randomnumbergeneration(pironio et al., 2010)

Example.Random number generation

PROBLEM: How to construct an apparatus which generates perfect random numbers (and hence secret) in a certifiable way?

001110101001010101…..

could have a copy of 001110101001010101…..

But in quantum mechanics copying is not allowed !!!

Example.Random number generation

Theorem (Pironio et al., Colbeck et al., 2010):

If (after many rounds in the game) one gets a value strictly larger than the classical one, there is a classical “deterministic” post-processing of the outputs a, b which produces numbers which are perfectly random and secret.

x

y

b

a

Example.Random number generation

The key is, hence, the existence of quantum strategies which are NOT classical. This guarantees an intrinsic randomness.

Classical

Quantum

Non-signaling

HISTORICAL NOTE

The existence of this intrinsic randomness is precisely what Einstein did not believe in his criticism of quantum mechanics in the 30’s.

The first experiment showing that, indeed, this randomness does ocurr was done by A. Aspect in the 80’s.

The experiment was based precisely on the analysis of the value of a particular game, known as CHSH (Clauser, Horne, Shimony, Holt).

### Our contribution

The problem we want to attack

How large can D be?

Classicalstrategies

D

Quantum strategies

Estimate D.

Parameters:

Number of questions = N

Size (dimension) of the quantum system = d

Violation of a bell inequality. Formal definition of D.

Bell inqualityT

BELL INEQUALITY= 2P1R GAME (generalized)

Operational interpretation of D

Where p is the maximum (classical) noise which a quantum strategy can withstand before getting classical.

Bell InequalityT

It is hence desirable to have a large D. How does D scale with the parameters N,M, d?

MAIN THEOREM

Theorem (Junge, Palazuelos, Pérez-García, Villanueva, Wolf, CMP + PRL, 2010).

D can be arbitrarily large, This requires:

N= D^2

M= EXP(D)

d= D^2

Recentimprovements

Theorem(Junge, Palazuelos, CMP, 2011).

D can be arbitrarily large, This requires:

N= D^2, M= D^2, d= D^2

Theorem (Buhrman et al, 2011).

D can be arbitrarily large, This requires:

N= D, M= EXP(D), d= D.

An interesting application

Theorem (Junge, Palazuelos, Pérez-García, Villanueva, Wolf, CMP + PRL, 2010).

There exist quantum estrategies with EXP(N) questions, N answers and dimension of the quantum system N which need the communication of log(N) bits to be simulated classically.

Quantum entanglement can save communication!!!

### The tools: Operator spaces

Operator Spaces

An operator space is a complex vector space E with a sequence of norms defined on such that:

Given a C*-algebra, there exists a unique norm which makes a C*-algebra. With these norms, A is an operator space.

Operator spaces

In particular:

Given

Operator spaces

The morphisms in this category are the completely bounded maps:

CB(E,F) is an operator space via

In particular E* is an operator space

Connection with the 2P1R games

Theorem (Junge, Palazuelos, Pérez-García, Villanueva, Wolf, CMP + PRL, 2010).

Given a 2P1R game (or more generally a Bell inequality)

The classical value is given (with the order a,x,b,y) by the norm:

The quantum value, by the norm:

What we learnt
• Operator Spaces are the natural mathematical framework to analyze 2P1R games.
• Some references in this direction:
• D. Pérez-García, M.M. Wolf, C. Palazuelos, I. Villanueva, M. Junge, Unbounded violations of Bell inequalities, Comm. Math. Phys. 279, 455 (2008)
• M. Junge, C. Palazuelos, D. Pérez-García, I. Villanueva, M.M. Wolf, Operator Space theory: a natural framework for Bell inequalities, Phys. Rev. Lett. 104, 170405 (2010).
• M. Junge, C. Palazuelos, D. Pérez-García, I. Villanueva, M.M. Wolf, Unbounded violations of bipartite Bell Inequalities via Operator Space theory, Comm. Math. Phys. 300, 715–739 (2010).
• M. Junge, M. Navascués, C. Palazuelos, D. Pérez-García, V.B. Scholtz, R.F. Werner, Connes' embedding problem and Tsirelson's problem, J. Math. Phys. 52, 012102 (2011)
• A.Salles, D. Cavalcanti, A. Acín, D. Pérez-García., M.M. Wolf, Bell inequalities from multilinear contractions, Quant. Inf. Comp. 10, 0703-0719 (2010) .
• M. Junge, C. Palazuelos, Large violation of Bell inequalities with low entanglement, Comm. Math. Phys. 306 (3), 695-746 (2011) .