Communication complexity of entanglement assisted multi-party computation
Abstract
We consider a quantum and a classical version of a multi-party function computation problem with players, where players need to communicate appropriate information to player 1, so that a ”generalized” inner product function with an appropriate promise can be calculated. In the quantum version of the protocol, the players have access to entangled qudits but the communication is still classical. The communication complexity of a given protocol is the total number of classical bits that need to be communicated. When is prime and for our chosen function, we exhibit a quantum protocol (with complexity bits) and a classical protocol (with complexity bits). We present an integer linear programming formulation for determining a lower bound on the classical communication complexity. This demonstrates that our quantum protocol is strictly better than classical protocols.
I Introduction
We consider a multi-party function computation scenario in this work. There are a total of players in the system numbered . Each player observes her input and players (remote parties) communicate an appropriate number of bits that allows player 1 to finally compute the value of the function. Clearly, this can be accomplished if players send their inputs but in fact in many cases, the function value can be computed with much lesser information. Thus, a natural question is to understand the minimum number of bits the remote parties need to send to player 1.
Such problems are broadly studied under the umbrella of communication complexity [1, 2] in the literature. In this work we consider the zero-error version of this problem. Our main goal is to understand the advantage that the availability of quantum entanglement confers on this problem and comparing it with classical protocols. Such problems have a long history in the literature [3, 4].
Background: Within quantum communication complexity (QCC) problems, there are three kinds of quantum protocols. In the first kind (introduced by Yao [2]) each player communicates via a quantum channel and the metric is the number of qubits transmitted. We call it the quantum transmission model. The second variation assumes that each player can use entanglement as a free resource but the communication is classical; the metric is the number of classical bits transmitted. We call it the entanglement model. It was introduced by Cleve and Buhrman [5]. The third kind is a combination of the first two. We call it the combined model. It allows free usage of entanglement and works with quantum communication. The work of de Wolf [6] shows that, in the two party case, the entanglement model can be reduced to the quantum transmission model with a factor of two penalty using teleportation [7].
Buhrman, Cleve, Wigderson [8] and Cleve, van Dam, Nielsen and Tapp [9] considered the case of the two party function computation with quantum communication and used reduction techniques to connect problems in QCC to other known problems and derived upper/lower bounds for QCC in this manner. In particular, the first work [8] showed examples, such as set disjointness function, where quantum protocols are strictly better than classical ones in the bounded-error setting. Here, the set-disjointness problem is such that each player has a set and wants to decide if their intersection is empty. Buhrman and de Wolf [10] generalized the two-party "log rank" lower bound of classical communication complexity to QCC where quantum protocols use both shared entanglement and quantum communication. For other two-party upper/lower bound techniques, see [11, 12, 13, 14, 15].
Related Work: Now we discuss works in multiparty quantum communication complexity. There are mainly two kinds of models. The number-in-hand (NIH) model assumes each player observes only one variable. The number-on-forehead (NOF) model assumes each player observes all but one variable. François and Shogo[16] considered the NIH model with quantum communication and gave a quantum protocol for a three-party triangle-finding problem; the formulation considers bounded error. This has polynomial advantage with respect to any classical protocol. Here, the triangle-finding problem is such that the edge set of a graph is distributed over each user and the task is to find a triangle of the graph.
The results in next two works hold for both NIH and NOF models. Lee and Schechtman and Shraibman [17] proved a Grothendieck-type inequality and then derived a general lower bound of the multiparty QCC for Boolean function in Yao’s model. Following this work, Briet, Buhrman, Lee, Vidick [18] showed a similar inequality for the multiparty XOR game and proved that the discrepancy method lower bounds QCC when the combined is of the third kind discussed earlier.
Buhrman, van Dam, Høyer, Tapp [19] considered the NIH model with shared entanglement and proposed a three-party problem with a quantum protocol that is better than any classical protocol by a constant factor. Following this work, Xue, Li, Zhang, Guo [20] and Galvão [21] showed similar results under the same function with more restrictions. The work most closely related to our work is by Cleve and Buhrman [5]. This paper considered the case of three players denoted Alice, Bob and Carol who have -bit strings denoted and respectively. The strings are such that , i.e., their binary sum (modulo-2) is the all-ones vector. The goal is for Alice to compute
using binary arithmetic. We note that the communication from Bob and Carol to Alice is purely classical; however, they can use entanglement in a judicious manner. For this particular function [5] shows that a classical protocol (without entanglement) requires three bits of communication, whereas if the parties share entangled qubits, then two bits of communication are sufficient.
Main Contributions: In this work, we consider a significant generalization of the original work of [5]. In particular, we consider a scenario with players (for prime ) that observe values that lie in a higher-order finite field, with a more general promise that is satisfied by the observed values. As we consider more players and higher-order finite fields, the techniques used in the original work are not directly applicable in our setting.
Our work makes the following contributions.
-
•
We demonstrate a quantum protocol that allows for the function to be computed with bits. We use the quantum Fourier Transform as a key ingredient.
-
•
On the other hand, we demonstrate a classical protocol that requires the communication of bits.
-
•
To obtain a lower bound on the classical communication complexity, we define an appropriate integer linear programming problem that demonstrates that our quantum protocol is strictly better than any classical protocol.
II Problem formulation
II-A Classical/Quantum Communication Scenarios
Let and denote sets in which the inputs and the output lie and be a multivariate function. There are players such that -th player is given . The first player (henceforth, Alice) receives information from each of the players and this communication should allow her to compute . The players are not allowed to communicate with each other.
In the classical protocol, players to communicate to Alice via classical channels. In the quantum protocol, we assume that the users have shared entanglement as a free resource; however, the communication is still classical. In both scenarios the classical/quantum communication complexity is the least possible number of classical bits transmitted such that Alice can compute the function among all classical/quantum protocols.
II-B Generalized Inner Product Function with a Promise
In this work we consider a specific multivariate function and the setting where (number of players) is prime. Let denote the finite field of order- and . The -th player is given a vector , i.e., each . The vectors satisfy the following “promise”: the -th component of each player’s vector is s.t.
i.e., lies in a two-dimensional vector space spanned by the basis vectors and . In this case, it can be observed that is either a multiple of the all-ones vector (if ) or a permutation of (if ). The function to be computed is the generalized inner product function given by
(1) |
where the operations are over .
III Proposed Quantum Protocol
We first discuss the entangled states and unitary transforms will be used in the proposed quantum protocol in Section III-A. In Section III-B, we discuss the quantum protocol with a proof of correctness in detail. A word about notation. In what follows for complex vectors , denotes the usual inner product. On the other hand if , then denotes the inner product over . Moreover, denotes the Kronecker delta function which equals 1 if and 0 otherwise. All logarithms in this paper are to the base-2.
III-A Entanglement Resource and Unitary Transforms Used
Shared Entangled States.
Consider isomorphic -dimensional quantum systems, where each system has a computational basis denoted . There are entangled states shared among players. For , prepare the entangled state
(2) |
The -th subsystem of this entangled state is given to -th player for .
Quantum Fourier Transform.
Let denote the -th root of unity. The Quantum Fourier Transform (QFT) is the following unitary map that takes
(3) |
Let denote QFT performed over isomorphic systems.
Phase Shift Map.
For , we define
(4) |
III-B The Quantum Protocol
Next, we introduce the quantum protocol.
Theorem 1.
There exists a quantum protocol for computing that uses bits.
In our protocol (see Alg. 1), for each , each player examines and applies the corresponding phase shift map to her subsystem of . Following this, she applies the QFT on each of her symbols and then measures in the computational basis; this yields for . Player then transmits . As players transmit a symbol from , it is clear that the total communication in the protocol is .
To show correctness of the protocol, we need the following auxiliary lemma. The proof appears in Appendix A.
Lemma 1.
Let . Then, for each , we have
(5) |
Then the amplitude iff where .
The proof of correctness of the protocol hinges on the following lemma.
Lemma 2.
(6) |
Proof.
Thus, has non-zero coefficients only for states such that by Lemma 1. Therefore, the measurement result must be one of s.t.
where follows from the fact that .
Now assume with . This implies that is distinct for each . It can be observed that is a permutation of , so it suffices to discuss by symmetry. We have that (see Appendix B for derivation)
(8) |
It follows that
By Lemma 1, iff . The measurement result must be such that
∎
Now, we show that our protocol computes correctly. Since , by applying (6), we have that
IV Proposed Classical protocol
We now move on to considering purely classical protocols for our problem, i.e., ones that do not consider entanglement. At the top-level our classical scheme operates by communicating the “number” of different symbols that exist in within each player’s vector. We show that this suffices for Alice to recover the function value.
More precisely, let be the number of “” values in the vector of -th player; recall that player is assigned . Note that .
Theorem 2.
There exists a classical protocol for computing that uses bits.
In our protocol (see Alg. 2), for each , each player transmits . Alice computes each by using the fact that . Finally, Alice computes the value of the function by using For each player , transmits . The total number of bits transmitted is . The proof of the Theorem 2 appears in Appendix C.
V Classical communication complexity lower bound
We now discuss a lower bound on the classical communication complexity that demonstrates a strict separation between our proposed quantum protocol and any classical protocol. Analytically, this seems to be a rather hard problem, and we discuss it as an item for future work. We are able to show however, the strict separation numerically using ILPs (see Section V-A below). In addition, we present an analytical argument below that demonstrates that for , the communication cost of any classical protocol is at least .
We assume that Alice, Bob, and Carol are given vectors , , and , respectively, each of length . The promise (cf. Sec. II-B) is equivalent to
(9) |
This implies that the GIP function in this case can be computed if we know any two out of , and . We assume that Carol labels her sequences () with one of at most three possible labels.We denote this label by a mapping . Recall that Alice knows .
Definition 1.
We define Bob’s confusion graph as follows. The vertex set corresponds to the sequences . The -th such sequence is denoted for , with similar notation for Alice and Carol’s sequences.
There exists an edge , for if there exists an Alice sequence and Carol sequences and such that (i) (note that we allow ), and (ii) .
Note that if , the Bob has to assign different labels to and ; otherwise, Alice has no way to compute the function with zero error. The idea of the confusion graph goes back to the work of Shannon [22].
The main idea of the argument below is to show that there exists a triangle in . This implies that the Bob needs to use at least three labels for Alice to decode with zero-error.
Since Carol uses at most three labels, then using the pigeon-hole principle there exist at least sequences that have the same Carol label. Let us denote this set .
Claim 1.
There is a subset of two coordinates where all nine patterns appear within the sequences in .
Proof.
Suppose that is even. Then, we can partition the coordinates as . Let us arrange the sequences in as rows; the number of rows is . Now suppose that the projection onto any pair of coordinates has at most 8 representatives. Then, the size of can be at most . For large enough , we have
∎
Without loss of generality, we assume that all nine patterns occur within the first two coordinates of . We pick 9 such representatives from and denote them ; the subscript corresponds to the values on the first two coordinates.
Let us pick Alice’s sequence . Corresponding to this , for the Carol sequences , using the promise we can obtain the corresponding Bob sequences . We note here that
where, e.g., denotes the components of vector from index 3 onwards (basically MATLAB notation).
Claim 2.
In Bob’s confusion graph, , the sequences and form a triangle.
Proof.
We need to examine for . Only the first two coordinates matter since . The corresponding evaluations are which are pairwise different. ∎
The above shows that Bob needs to use at least three labels for Alice to decode with zero-error. By symmetry, Carol needs to use three labels as well. To summarize, the communication complexity of any classical protocol is at least bits.
Remark 1.
It may be possible to use a variant of the above combinatorial argument to establish that the chromatic number of is strictly larger than three. However, this does not seem to follow in a straightforward manner.
Feasibility | |||
---|---|---|---|
1 | 1 | 3 | Feasible |
3 | 1 | 17 | Infeasible |
2 | 2 | 4 | Infeasible |
3 | 3 | 3 | Infeasible |
2 | 3 | 4 | Feasible |
3 | 5 | 5 | Feasible |
V-A ILP Feasibility Problem for Classical Lower Bound
We now present a lower bound on the communication complexity of any classical protocol for our problem. Towards this end we pose this as an integer linear programming problem that can be solved numerically.
Suppose, for , the -th player sends symbols (labels) in for some large enough positive integer . Let and define to be the indicator that the -th player sends when it has the vector . As this mapping is unique, we have . Furthermore, for a given set of vectors for if the -th player sends label , we have .
Consider two sets of vectors , . We denote if the following conditions are satisfied.
-
1.
Both and satisfy the promise (cf. Sec. II-B).
-
2.
.
-
3.
.
This definition applies to distinct inputs with the "same" Alice vector, but different function evaluations. It can be seen that for two such distinct inputs, the symbols communicated by players 2 to have to be distinct, otherwise Alice has no way to decode in a zero-error fashion.
Our proposed ILP works with fixed ’s and a fixed value of . Owing to complexity reasons cannot be very large. However, we point out that if the ILP is infeasible for given ’s and a , then our lower bound holds for arbitrary values . To see this we note that our lower bound would continue to hold even if Alice was provided the values for all players .
Consider a integer programming feasibility problem:
(10) | ||||
s.t. | ||||
for all |
The infeasibility of the above problem corresponds to a lower bound on the classical communication complexity. The proof of the following theorem appears in Appendix D.
Theorem 3.
There exists a deterministic classical protocol computing where each player sends at most different labels for iff the above integer programming is feasible.
V-B Numerical experiments
In our numerical experiments, we considered an instance of the ILP involving players, namely Alice, Bob, and Carol. Let represent the length of each vector, while denote the sets of labels used by Bob and Carol, with as the sizes of these sets.
We assume that Alice, Bob, and Carol are given vectors , , and , respectively, each of length . In this case, the promise is given by (9). It can be observed that swapping the vectors of Bob and Carol continues to satisfy the promise. Due to this inherent symmetry, a protocol with communication lengths and exhibits the same feasibility as one with and . Consequently, for the ILP we can assume that .
The experimental results under varying settings of are displayed in TABLE I. It shows for instance, that when and , the ILP is infeasible with . This implies that for a feasible classical protocol, with , we need at least bits to be transmitted from Carol. Similarly, the triplets and are infeasible. This implies that when equals 2 or 3 the sum rate is .
Recalling that our proposed protocol employs bits of communication, and by the fact that
we conclude that there is a strict separation between our quantum protocol and any classical protocol.
References
- [1] A. C.-C. Yao, “Some complexity questions related to distributive computing(preliminary report),” in Proceedings of the Eleventh Annual ACM Symposium on Theory of Computing, ser. STOC ’79. New York, NY, USA: Association for Computing Machinery, 1979, p. 209–213. [Online]. Available: https://doi.org/10.1145/800135.804414
- [2] A. Chi-Chih Yao, “Quantum circuit complexity,” in Proceedings of 1993 IEEE 34th Annual Foundations of Computer Science, 1993, pp. 352–361.
- [3] R. Horodecki, P. Horodecki, M. Horodecki, and K. Horodecki, “Quantum entanglement,” Rev. Mod. Phys., vol. 81, pp. 865–942, Jun 2009. [Online]. Available: https://link.aps.org/doi/10.1103/RevModPhys.81.865
- [4] H. Buhrman, R. Cleve, S. Massar, and R. de Wolf, “Nonlocality and communication complexity,” Rev. Mod. Phys., vol. 82, pp. 665–698, Mar 2010. [Online]. Available: https://link.aps.org/doi/10.1103/RevModPhys.82.665
- [5] R. Cleve and H. Buhrman, “Substituting quantum entanglement for communication,” Phys. Rev. A, vol. 56, pp. 1201–1204, Aug 1997. [Online]. Available: https://link.aps.org/doi/10.1103/PhysRevA.56.1201
- [6] R. de Wolf, “Quantum communication and complexity,” Theoretical Computer Science, vol. 287, no. 1, pp. 337–353, 2002, natural Computing. [Online]. Available: https://www.sciencedirect.com/science/article/pii/S0304397502003778
- [7] C. H. Bennett, G. Brassard, C. Crépeau, R. Jozsa, A. Peres, and W. K. Wootters, “Teleporting an unknown quantum state via dual classical and einstein-podolsky-rosen channels,” Phys. Rev. Lett., vol. 70, pp. 1895–1899, Mar 1993. [Online]. Available: https://link.aps.org/doi/10.1103/PhysRevLett.70.1895
- [8] H. Buhrman, R. Cleve, and A. Wigderson, “Quantum vs. classical communication and computation,” in Proceedings of the Thirtieth Annual ACM Symposium on Theory of Computing, ser. STOC ’98. New York, NY, USA: Association for Computing Machinery, 1998, p. 63–68. [Online]. Available: https://doi.org/10.1145/276698.276713
- [9] R. Cleve, W. van Dam, M. Nielsen, and A. Tapp, “Quantum entanglement and the communication complexity of the inner product function,” Theoretical Computer Science, vol. 486, pp. 11–19, 2013, theory of Quantum Communication Complexity and Non-locality. [Online]. Available: https://www.sciencedirect.com/science/article/pii/S030439751201105X
- [10] H. Buhrman and R. de Wolf, “Communication complexity lower bounds by polynomials,” in Proceedings of Computational Complexity. Sixteenth Annual IEEE Conference. Los Alamitos, CA, USA: IEEE Computer Society, jun 2001, p. 0120. [Online]. Available: https://doi.ieeecomputersociety.org/10.1109/CCC.2001.933879
- [11] A. A. Razborov, “Quantum communication complexity of symmetric predicates,” Izvestiya: Mathematics, vol. 67, no. 1, p. 145, feb 2003. [Online]. Available: https://dx.doi.org/10.1070/IM2003v067n01ABEH000422
- [12] H. Klauck, “Lower bounds for quantum communication complexity,” SIAM Journal on Computing, vol. 37, no. 1, pp. 20–46, 2007. [Online]. Available: https://doi.org/10.1137/S0097539702405620
- [13] W. van Dam and P. Hayden, “Renyi-entropic bounds on quantum communication,” 2002.
- [14] A. Marwah and D. Touchette, “Optical quantum communication complexity in the simultaneous-message-passing model,” Phys. Rev. A, vol. 102, p. 062608, Dec 2020. [Online]. Available: https://link.aps.org/doi/10.1103/PhysRevA.102.062608
- [15] F. Le Gall and D. Suruga, “Bounds on oblivious multiparty quantum communication complexity,” in LATIN 2022: Theoretical Informatics, A. Castañeda and F. Rodríguez-Henríquez, Eds. Cham: Springer International Publishing, 2022, pp. 641–657.
- [16] F. L. Gall and S. Nakajima, “Multiparty Quantum Communication Complexity of Triangle Finding,” in 12th Conference on the Theory of Quantum Computation, Communication and Cryptography (TQC 2017), ser. Leibniz International Proceedings in Informatics (LIPIcs), M. M. Wilde, Ed., vol. 73. Dagstuhl, Germany: Schloss Dagstuhl–Leibniz-Zentrum fuer Informatik, 2018, pp. 6:1–6:11. [Online]. Available: http://drops.dagstuhl.de/opus/volltexte/2018/8579
- [17] T. Lee, G. Schechtman, and A. Shraibman, “Lower bounds on quantum multiparty communication complexity,” in 2009 24th Annual IEEE Conference on Computational Complexity, 2009, pp. 254–262.
- [18] J. Briet, H. Buhrman, T. Lee, and T. Vidick, “Multiplayer xor games and quantum communication complexity with clique-wise entanglement,” 2009. [Online]. Available: https://arxiv.org/abs/0911.4007
- [19] H. Buhrman, W. van Dam, P. Høyer, and A. Tapp, “Multiparty quantum communication complexity,” Phys. Rev. A, vol. 60, pp. 2737–2741, Oct 1999. [Online]. Available: https://link.aps.org/doi/10.1103/PhysRevA.60.2737
- [20] P. Xue, C.-F. Li, Y.-S. Zhang, and G.-C. Guo, “Three-party quantum communication complexity via entangled tripartite pure states,” Journal of Optics B: Quantum and Semiclassical Optics, vol. 3, no. 4, p. 219, jul 2001. [Online]. Available: https://dx.doi.org/10.1088/1464-4266/3/4/304
- [21] E. F. Galvão, “Feasible quantum communication complexity protocol,” Phys. Rev. A, vol. 65, p. 012318, Dec 2001. [Online]. Available: https://link.aps.org/doi/10.1103/PhysRevA.65.012318
- [22] C. Shannon, “The zero error capacity of a noisy channel,” IRE Transactions on Information Theory, vol. 2, no. 3, pp. 8–19, 1956.
- [23] “Python code for ILP in Sec. V.” [Online]. Available: https://github.com/mengruoyu/ILP
Appendix A Proof of Lemma 1
Recall that
The action of on is
Write . Therefore,
When satisfies , we have that . Otherwise, since and being prime, and . We have
Appendix B Derivation of equation (7) and equation (8)
We derive equation (7) by considering two cases. The first case is that . Then, we have
(11) |
The second case is that with . Then, we have
(12) |
where the last equality holds since . Thus, in this case collectively, we can express the joint state after phase-shifting as .
Now we derive equation (8). We have
where follows from the fact that for . It follows that
Appendix C Proof of Theorem 2
For , we define and . Since the promise ensures that, for each , there exists s.t. , we have that forms a partition of the set
When , i.e. , we have
(13) |
Otherwise, we have for some , so . Then,
(14) |
By (13) and (14), if , then Define
i.e., it is the indicator of . Since for exactly one choice of , it follows that
(15) |
We have
(16) |
Here, (*) follows from (15). Our next step is to show ; is defined in Alg. 2.
Suppose , then . For the th player, is the value of the th coordinate of her vector . For a fixed , the set of s.t. is . It follows that
(17) |
Consider . When , is counted times. Denote For arbitrary , the equation
has a unique solution given by
Thus, we have
Therefore, when , is counted exactly once. It follows that
(18) |
Now we have
Note is prime, so is divisible by 2. It follows that
Divide both sides by and we get . Now we are done because of (16).
Appendix D Proof of theorem 3
Suppose that we have a protocol that computes the function with zero-error. Our protocol is deterministic, so, for each , it associates exactly one label such that the -th player sends if his vector is . We set and for all Therefore, and are satisfied for all choice of .
Next, suppose we have that . Furthermore, assume that the -th player sends for for . This implies that and that . In addition, note that such that as for these sequences, the symbols transmitted from users have to be distinct.
Thus we have
and consequently
Therefore, the third constraint is satisfied.
Conversely, if we have that satisfy the constraints of the ILP, then we construct a classical protocol as follows. Suppose -th player has vector for . Since there exists exactly one s.t. , then sends to Alice for . When Alice receives the symbols from the other players she picks arbitrary s.t. satisfies the promise and .Then she outputs . In what follows we show that
To see this assume otherwise. Then, we have It follows that
Owing to the third constraint, we have that
However, we have that for all . By the first and second constraint, we have that for all and . Therefore,
This gives the desired contradiction.
Appendix E Linearizing constraints in the integer programming problem
One issue with the optimization problem in (10) is that the third constraint has multiple absolute value and products of variables. Here we transform the constraints and add extra variable in (10) to get the desired ILP.
Our first step is to introduce auxiliary 0-1 variables that correspond to the product of other 0-1 variables. For instance, it can be verified that we can handle as follows.
(19) | ||||
(20) |
As a first step we introduce such auxiliary variable for all terms that involve products of our indicator function in (10).
Following this step, we are left with handling constraints that involve sums of absolute values of differences. For this step we show how to replace each absolute value difference by another auxiliary variable. In particular, we can replace by as follows.
where the last step follows from the fact that the variables are of type . The product term can be linearized as described previously. Following these steps, all constraints in the integer programming problem are linear.