Approximate Span Programs
نویسندگان
چکیده
Span programs are a model of computation that have been used to design quantum algorithms, mainly in the query model. It is known that for any decision problem, there exists a span program that leads to an algorithm with optimal quantum query complexity, however finding such an algorithm is generally challenging. In this work, we consider new ways of designing quantum algorithms using span programs. We show how any span program that decides a problem f can also be used to decide “property testing” versions of the function f , or more generally, approximate a quantity called the span program witness size, which is some property of the input related to f . For example, using our techniques, the span program for OR, which can be used to design an optimal algorithm for the OR function, can also be used to design optimal algorithms for: threshold functions, in which we want to decide if the Hamming weight of a string is above a threshold, or far below, given the promise that one of these is true; and approximate counting, in which we want to estimate the Hamming weight of the input up to some desired accuracy. We achieve these results by relaxing the requirement that 1-inputs hit some target exactly in the span program, which could potentially make design of span programs significantly easier. In addition, we give an exposition of span program structure, which increases the general understanding of this important model. One implication of this is alternative algorithms for estimating the witness size when the phase gap of a certain unitary can be lower bounded. We show how to lower bound this phase gap in certain cases. As an application, we give the first upper bounds in the adjacency query model on the quantum time complexity of estimating the effective resistance between s and t, Rs,t(G). For this problem we obtain Õ( 1 ε3/2 n √ Rs,t(G)), using O(log n) space. In addition, when μ is a lower bound on λ2(G), by our phase gap lower bound, we can obtain an upper bound of Õ ( 1 ε n √ Rs,t(G)/μ ) for estimating effective resistance, also using O(log n) space.
منابع مشابه
Reasoning about Divergences for Relaxations of Differential Privacy
We develop a semantics framework for verifying recent relaxations of differential privacy: Rényi differential privacy and zero-concentrated differential privacy. Both notions require a bound on a particular statistical divergence between two probability distributions. In order to reason about such properties compositionally, we introduce approximate span-liftings, generalizing approximate relat...
متن کاملLifting Nullstellensatz to Monotone Span Programs over Any Field
We characterize the size of monotone span programs computing certain “structured” boolean functions by the Nullstellensatz degree of a related unsatisfiable Boolean formula. This yields the first exponential lower bounds for monotone span programs over arbitrary fields, the first exponential separations between monotone span programs over fields of different characteristic, and the first expone...
متن کاملOn the Size of Monotone Span Programs
Span programs provide a linear algebraic model of computation. Monotone span programs (MSP) correspond to linear secret sharing schemes. This paper studies the properties of monotone span programs related to their size. Using the results of van Dijk (connecting codes and MSPs) and a construction for a dual monotone span program proposed by Cramer and Fehr we prove a non-trivial upper bound for ...
متن کاملRobust Experiment Design for System Identification via Semi-Infinite Programming Techniques
Robust optimal experiment design for dynamic system identification is cast as a minmax optimization problem, which is infinite-dimensional. If the input spectrum is discretized (either by considering a Riemmann approximation, or by restricting it to the span of a finite dimensional linear space), this problem falls within the class of semi-infinite convex programs. One approach to this optimiza...
متن کاملConversions among Several Classes of Predicate Encryption and Their Applications
Predicate encryption is an advanced form of public-key encryption that yield high flexibility in terms of access control. In the literature, many predicate encryption schemes have been proposed such as fuzzy-IBE, KP-ABE, CPABE, (doubly) spatial encryption (DSE), and ABE for arithmetic span programs. In this paper, we study relations among them and show that some of them are in fact equivalent b...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2016